ESC2015
esc2015
https://www.cryptolux.org/mediawiki-esc2015/index.php/ESC_2015
MediaWiki 1.31.8
first-letter
Media
Special
Talk
User
User talk
ESC2015
ESC2015 talk
File
File talk
MediaWiki
MediaWiki talk
Template
Template talk
Help
Help talk
Category
Category talk
Main Page
0
1
1
2014-06-30T08:43:16Z
MediaWiki default
0
wikitext
text/x-wiki
'''MediaWiki has been successfully installed.'''
Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software.
== Getting started ==
* [//www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list]
* [//www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ]
* [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list]
b7a3846f2c55072191227d89a3204fe379288fee
MediaWiki:Sidebar
8
2
2
2014-06-30T08:48:13Z
Yann
1
Created page with "* ESC 2015 ** ESC 2015 | Home ** Proceedings | Proceedings ** List_of_participants | List of participants ** Getting_there | Getting there ** Seminar_program | Seminar program..."
wikitext
text/x-wiki
* ESC 2015
** ESC 2015 | Home
** Proceedings | Proceedings
** List_of_participants | List of participants
** Getting_there | Getting there
** Seminar_program | Seminar program
** Special:Abstracts | Talk abstracts
** Rump_session | Rump Session
** Discussion | Discussion
* SEARCH
* TOOLBOX
d4ebc115bc5bdb0290f57afdf5c5e30ba3540053
ESC 2015
0
3
3
2014-06-30T09:19:54Z
Alex
2
Created page with "__NOTOC__ == Early Symmetric Crypto (ESC) seminar == 12-16 January 2015 in Clervaux, Luxembourg === Program Chairs === Alex Biryukov Joan Daemen Stefan Lucks Serge Vaude..."
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) seminar ==
12-16 January 2015 in Clervaux, Luxembourg
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity
* Integrity
* Privacy
* Block Ciphers
* Stream Ciphers
* Hash Functions
* Authenticated Encryption
* Lightweight crypto
* Provable Security
* Cryptanalysis
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
Clervaux
Vianded
Hikes
=== Weather ===
e8a23ab9a5d58bf143a5448e41e995494005e4c8
8
3
2014-06-30T10:38:05Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) seminar ==
12-16 January 2015 in Clervaux, Luxembourg
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
• symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
• complex cryptosystems and cryptographic protocols employing these primitives
• algorithmic challenges in public and symmetric cryptography.
Special sub-topics that will be explored this year would be:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography (this topic is in line with the CORE ACRYPT project).
The aim of the workshop is to bring together leading experts and talented junior researchers. The exceptional feature of this seminar is that at least half of the participants are also speakers, since they are invited to give presentations on their most recent or on-going research.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
3ceed63a9c483e5428680ca4db7c4fc69e012da1
9
8
2014-06-30T10:39:04Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) seminar ==
12-16 January 2015 in Clervaux, Luxembourg
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
• symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
• complex cryptosystems and cryptographic protocols employing these primitives
• algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers. The exceptional feature of this seminar is that at least half of the participants are also speakers, since they are invited to give presentations on their most recent or on-going research.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography (this topic is in line with the CORE ACRYPT project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
e7da933541ba75b457701a02f945559756177c44
10
9
2014-06-30T10:40:39Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
• symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
• complex cryptosystems and cryptographic protocols employing these primitives
• algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers. The exceptional feature of this seminar is that at least half of the participants are also speakers, since they are invited to give presentations on their most recent or on-going research.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography (this topic is in line with the CORE ACRYPT project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
6e5a7f604053b79c37c4e2c47f6962be9c3823a4
11
10
2014-06-30T10:41:05Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
• symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
• complex cryptosystems and cryptographic protocols employing these primitives
• algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers. The exceptional feature of this seminar is that at least half of the participants are also speakers, since they are invited to give presentations on their most recent or on-going research.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography (this topic is in line with the CORE ACRYPT project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
c2648591bc91d66fdfa7bf8f8b64bf1193a52947
12
11
2014-06-30T10:41:18Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers. The exceptional feature of this seminar is that at least half of the participants are also speakers, since they are invited to give presentations on their most recent or on-going research.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography (this topic is in line with the CORE ACRYPT project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
f620778bd8f2ab3af251a91bd88af0ac695de65c
13
12
2014-06-30T10:45:30Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (Groebner bases, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
605dc2da91723d789d40f8a00996d393d94727e4
14
13
2014-06-30T10:46:32Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event (2008, 2010, 2013) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
bd31143d9e7f06c457ecf2b8f8a71034a8f7edf9
15
14
2014-06-30T10:50:08Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars (2007, 2009, 2012, 2014) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
ab1cc45a74db3c8968a36746e784c4f110e11de0
16
15
2014-06-30T10:52:04Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
72522575f85086f925b135f31f06d68419894b38
17
16
2014-06-30T10:56:04Z
Alex
2
/* Venue */
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
[[Image:clervaux.jpg|200px|thumb|left|Clervaux]]
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
f27b3f85fa2297ca91f250e4cd4a0c8aa181ab95
19
17
2014-06-30T12:47:50Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
[[Image:clervaux.jpg|400px|thumb|left|Clervaux]]
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
ca6b43fba23e055047722f2b522f521e9a367a4f
20
19
2014-06-30T12:48:39Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|left|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
990207e060bbb7c01037015d2bde9a7ce30d5e4e
21
20
2014-06-30T12:49:04Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|left|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
505b0fe2a712f1a7667876b21e1999d34aadb050
22
21
2014-06-30T12:49:28Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
Alex Biryukov
Joan Daemen
Stefan Lucks
Serge Vaudenay
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
20e4712a5e04b2c787bfc1507925db4334bf12f2
23
22
2014-06-30T13:56:01Z
Alex
2
/* Program Chairs */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[Alex Biryukov | Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
66e4ae5bcde88e921a4c0347ea588b2dba220953
24
23
2014-06-30T13:57:02Z
Alex
2
/* Program Chairs */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition (CAESAR) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
e529aa2734fa6a4f34b3ad4926255f8845e47425
25
24
2014-06-30T13:57:59Z
Alex
2
/* The List of topics */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running password-hashing competition.
*Design and analysis of lightweight cryptography.
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
9306a81c2cf973ddeef9d3d7204673c3b7dff45d
26
25
2014-06-30T14:00:50Z
Alex
2
/* The List of topics */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel ... in Clervaux, a castle town in Luxembourg in Ardennes.
Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
0805d8b6f5121876ba75ae52c9358ace020cbc3b
27
26
2014-07-08T15:03:06Z
Alex
2
/* Venue */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel International in Clervaux, a castle town in Luxembourg in Ardennes.
<--Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
-->
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
3d104ec1b61d2f8eab408194f35694d9a0b501ab
28
27
2014-07-08T15:04:41Z
Alex
2
/* Venue */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in Ardennes.
<!--Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
-->
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
9eb0d3b74ef2e1941b8f0b6a9788450ff2956e68
29
28
2014-07-08T15:06:05Z
Alex
2
/* Venue */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
<!--Please contact the hotel for booking: ...
Please put <fabienne.schmitz@uni.lu> in CC.
Prices:
Single room (1 single bed): ..
Classic single room (1 double bed): ..
Double room: ...
Breakfast is included. We cover lunches and dinners.
-->
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
211027ebb516ead6ef8a140e09c2c6ac3cca512e
30
29
2014-07-08T15:29:30Z
Alex
2
/* Venue */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
....
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
4158f998c1926ad6c0ad78cae98c955fa4ffbfa5
31
30
2014-07-08T15:30:41Z
Alex
2
/* Proceedings */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches and dinners.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
f9e10fd85717935f4053fe8fba8da90898b86520
32
31
2014-07-08T15:32:19Z
Alex
2
/* Venue */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
8b459972965f52572957bf2aaa27334110c1f894
522
32
2014-12-05T10:20:21Z
Yann
1
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.#
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
cb37c7fdba90f34dad49ba0a20bb04a42f2f87d3
523
522
2014-12-05T10:20:28Z
Yann
1
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle
*Hikes
=== Weather ===
1bf4f07f74e35356454d01d84a35c2aa9b9b19c7
524
523
2014-12-05T10:23:37Z
Alex
2
/* Tourism */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
171aee696f505c753df4b5d54957b5b5f4d11049
525
524
2014-12-05T10:25:59Z
Alex
2
/* Weather */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
2c7594b3921825b04bd45d0d4fb730d91c0fcf61
527
525
2014-12-05T10:36:11Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|FNR logo]]
6c1311de1b7e11f183138b1142702e5e9af902f4
528
527
2014-12-05T10:42:17Z
Alex
2
/* Sponsors */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|FNR logo]] [[Image:LACS_logo.jpg|LACS logo]]
ed224216cec95a6b222ff6345810ee22a18fe9aa
530
528
2014-12-05T10:42:54Z
Alex
2
/* Sponsors */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|FNR logo]] [[Image:LACS-logo.jpg|LACS logo]]
43c955c572ac92c9656034962336f2fe3f051f72
531
530
2014-12-05T10:43:30Z
Alex
2
/* Sponsors */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|FNR logo]] [[Image:LACS-logo.jpg|LACS logo]]
04bca02d50338dcb833ec0a6406ccc269830d0bf
532
531
2014-12-05T11:06:30Z
Alex
2
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by the [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|100px|FNR logo]] [[Image:LACS-logo.jpg|100px|LACS logo]]
c08082b6ede17269ed6598d496f3cbb602b96375
533
532
2014-12-05T11:06:45Z
Alex
2
/* Sponsors */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here will be the program
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by the [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|200px|FNR logo]] [[Image:LACS-logo.jpg|200px|LACS logo]]
9923a5bb5558827f51a0d800fed5cc1f199aa2e1
MediaWiki:Mainpage
8
4
4
2014-06-30T09:31:05Z
Yann
1
Redirected page to [[ESC 2015]]
wikitext
text/x-wiki
#REDIRECT [[ESC_2015]]
980ef9ae90c41cc7b3c1806b5b0e8399660c052f
5
4
2014-06-30T09:41:46Z
Yann
1
wikitext
text/x-wiki
#REDIRECT [[ESC 2015]]
81ce8bccda7dad472e891726612a2706a7504689
6
5
2014-06-30T09:42:29Z
Yann
1
wikitext
text/x-wiki
Main page
97461b6c9e4e8749cbc57fafb28060bcbd15d377
7
6
2014-06-30T09:43:01Z
Yann
1
wikitext
text/x-wiki
ESC 2015
6684a6ce32e2d2d5b00d00828f62c27e6a3fb580
File:Clervaux.jpg
6
5
18
2014-06-30T12:21:44Z
Yann
1
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Talk:ESC 2015
1
6
33
2014-08-06T19:56:59Z
178.137.215.97
0
Производство мебели из дерева на заказ
wikitext
text/x-wiki
<a href=http://www.abey.ru/directions/lestnitsy/>фабрики по производству лестниц для коттеджей</a>
Большой дом немыслимо себе представить без лестниц, а комнаты – без мебели, причем роскошной и искусно сделанной. Это же касаемо и лестниц. Приятно подниматься на второй этаж дома, дотрагиваясь до резных деревянных перил, ощущая себе в другом столетии.
<a href=http://www.abey.ru/directions/interery/>эксклюзивные деревянные изделия</a>
Если вы хотите иметь в собственном доме оригинальные шкафы из дерева в стиле XIX века, оригинальные кровати с резными быльцами, сделанные по вашему желанию, большой деревянный стол, за которым так приятно собираться всей семьей, тогда мы ожидаем ваших заказов, чтобы исполнить все ваши пожелания. Мы – это компания «Абей», делающая ваш дом стильным, комфортным, красивым, роскошным, деревянным.
<a href=http://www.abey.ru/rasprodazha/>брус 100 100 бук</a>
Кроме лестниц и обстановки нам под силу сауны и бани, а также изысканную деревянную отделку всего вашего жилья, в том числе и уникальный интерьер бильярдных помещений и кабинетов. Уйти от пластика и ненатуральных материалов, вернуться к жизни, дыша глубоко и спокойно в своем собственном доме – что может быть лучше! Тем более деревянная мебель в интерьере – это еще и стильно, и красиво выглядит.
<a href=http://www.abey.ru/>мебельные изделия из дерева на заказ</a>
Все ваши идеи мы претворим в процессе работы, но также можем предоставить готовые дизайнерские идеи интерьера и мебели, саун и эксклюзивных лестниц.
e543fa3dc580c80813a679629dd0d0adbbe03ff5
521
33
2014-10-11T11:46:17Z
Yann
1
Blanked the page
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Fnr logo web.jpg
6
405
526
2014-12-05T10:34:53Z
Alex
2
FNR logo
wikitext
text/x-wiki
FNR logo
618520b6b77e2ee345eaec599f4db9624c497a9e
File:LACS-logo.jpg
6
406
529
2014-12-05T10:42:34Z
Alex
2
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
List of participants
0
407
534
2014-12-05T11:14:41Z
Alex
2
Created page with "=== Participants === *[[Andrey Bogdanov]] *[[Anne Canteaut]] *[[Antoine Joux]] *[[Bart Preneel]] *[[Carlos Cid]] *[[Cécile Pierrot]] *[[Celine Blondeau]] *[[Cristian Rechber..."
wikitext
text/x-wiki
=== Participants ===
*[[Andrey Bogdanov]]
*[[Anne Canteaut]]
*[[Antoine Joux]]
*[[Bart Preneel]]
*[[Carlos Cid]]
*[[Cécile Pierrot]]
*[[Celine Blondeau]]
*[[Cristian Rechberger]]
*[[Damian Vizar]]
*[[Dmitry Khovratovich]]
*[[Eik List]]
*[[Elena Andreeva]]
*[[Eli Biham]]
*[[Farzaneh Abed]]
*[[Florian Mendel]]
*[[François-Xavier Standaert]]
*[[Frederik Armknecht]]
*[[Gaetan Leurent]]
*[[Gildas Avoine]]
*[[Gilles Van Assche]]
*[[Gregor Leander]]
*[[Guido Bertoni]]
*[[Henri Gilbert]]
*[[Itai Dinur]]
*[[Jean-Philippe Aumasson]]
*[[Kaisa Nyberg]]
*[[Kan Yasuda]]
*[[Kasumaru Aoki]]
*[[Leo Perrin]]
*[[Maria Naya-Plasencia]]
*[[Michael Peeters]]
*[[Orr Dunkelman]]
*[[Petr Susil]]
*[[Reza Reyhanitabar]]
*[[Steve Babbage]]
*[[Tetsu Iwata]]
*[[Thomas Peyrin]]
*[[Vesselin Velichkov]]
*[[Willi Meier]]
*[[Yu Sasaki]]
*[[Alex Biryukov]]
*[[Joan Daemen]]
*[[Stefan Lucks]]
*[[Serge Vaudenay]]
2fe966c2522c00e12676aaa22375e2a051944491
Getting there
0
408
535
2014-12-05T11:16:39Z
Alex
2
Created page with "==== Contact ==== If you need any help, please contact: Fabienne SCHMITZ <fabienne.schmitz@uni.lu> Secretariat Computer Science and Communications Research Unit Univers..."
wikitext
text/x-wiki
==== Contact ====
If you need any help, please contact:
Fabienne SCHMITZ <fabienne.schmitz@uni.lu>
Secretariat
Computer Science and Communications Research Unit
University of Luxembourg
T. +352 46 66 44 5766
F. +352 46 66 44 5620
976691600f96a21aaa3a56dbb5efdc1285be8e40
Alex Biryukov
0
409
536
2014-12-05T11:20:01Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
Andrey Bogdanov
0
410
537
2014-12-05T11:21:16Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
Anne Canteaut
0
411
538
2014-12-05T11:21:28Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
562
538
2014-12-28T11:29:43Z
Joan
3
wikitext
text/x-wiki
Anne Canteaut: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Abstract: In this work, we investigate the effect of affine transformations of the Sbox on the maximal expected differential probability and linear potential over two rounds of a substitution-permutation network, when the diffusion layer is linear over the finite field defined by the Sbox alphabet. One of our aims is to understand why the MEDP and MELP of the AES both increase when the AES Sbox is replaced by the inversion in GF{2^8}. Most notably, we will show that this phenomenon is related to the fact that the inversion is an involution.
6bbc10f825cdf55f1248da5a6e0fdd3ba7daba46
Antoine Joux
0
412
539
2014-12-05T11:21:40Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
Joan Daemen
0
413
540
2014-12-05T11:22:02Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
575
540
2015-01-07T09:39:41Z
Joan
3
wikitext
text/x-wiki
Title: Spectral characterization of uniformity loss and application to Keccak, revisited
Abstract:
We study threshold sharing schemes against DPA and investigate in what way the failure to meet the uniformity condition may jeopardize the immunity against first-order DPA.
For this we introduce a treatment of discrete distributions and vector Boolean mappings in the spectral domain using correlation matrices. We identify the characteristic properties of discrete distributions and mappings that are important in the macroscopic analysis: the total imbalance and imbalance contribution. We show that the total imbalance of the result of applying an iterated mapping to an input is the sum of the imbalance of that input plus the sum of the imbalances of the rounds of the iterated mappings. In the microscopic analysis we make use of (reduced) correlation matrices and imbalance vectors that are inherent in lossy mappings.
We apply our theory on non-uniform sharing and use the one for Keccak as a test bench for our techniques. In particular, we propose an new generic trick to address non-uniformity and show that its application makes any remaining imbalances unexploitable.
f64c808d86dc2049eedc1a0abf928cc271faee93
Stefan Lucks
0
414
541
2014-12-05T11:22:15Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
Serge Vaudenay
0
415
542
2014-12-05T11:22:26Z
Alex
2
Created page with "TBA"
wikitext
text/x-wiki
TBA
ae50ce81c0ab15346851715818b855eed68b0618
Seminar program
0
416
543
2014-12-05T11:25:58Z
Alex
2
Created page with "== '''12-January 2015 1st day of the seminar''' == 8:30-9:00 ''Welcome coffee/tea'' 9:00 Seminar start '''Session 1:''' 9:00-10:20 [[TBA]]: TBA [[TBA]]: TBA 10:20-10:50..."
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1:''' 9:00-10:20
[[TBA]]: TBA
[[TBA]]: TBA
10:20-10:50 ''Break''
'''Session 2:''' 10:50-12:10
[[TBA]]: TBA
[[TBA]]: TBA
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[TBA]]: TBA
[[TBA]]: TBA
[[TBA]]: TBA
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[TBA]]: TBA
[[TBA]]: TBA
19:00 - 21:00 ''Dinner''
== '''15-January 2013 2nd day of the seminar''' ==
.....
8ce5e166193809e28c6e14f98d532d37b52a6c07
544
543
2014-12-05T11:27:04Z
Alex
2
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1:''' 9:00-10:20
[[TBA]]: TBA
[[TBA]]: TBA
10:20-10:50 ''Break''
'''Session 2:''' 10:50-12:10
[[TBA]]: TBA
[[TBA]]: TBA
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[TBA]]: TBA
[[TBA]]: TBA
[[TBA]]: TBA
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[TBA]]: TBA
[[TBA]]: TBA
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
....
== '''14-January 2015 2nd day of the seminar''' ==
....
== '''15-January 2015 2nd day of the seminar''' ==
....
== '''16-January 2015 2nd day of the seminar''' ==
....
72b71992dc605b1d5f7a6db043472aeda176a5d1
545
544
2014-12-05T11:27:46Z
Alex
2
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1:''' 9:00-10:20
[[TBA]]: TBA
[[TBA]]: TBA
10:20-10:50 ''Break''
'''Session 2:''' 10:50-12:10
[[TBA]]: TBA
[[TBA]]: TBA
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[TBA]]: TBA
[[TBA]]: TBA
[[TBA]]: TBA
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[TBA]]: TBA
[[TBA]]: TBA
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
....
== '''14-January 2015 3rd day of the seminar''' ==
....
== '''15-January 2015 4th day of the seminar''' ==
....
== '''16-January 2015 5th day of the seminar''' ==
....
a4750790a7538948d520be35bc1f370792335b55
553
545
2014-12-26T08:15:51Z
Joan
3
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements, part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements, part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security, part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security, part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Kaisa Nyberg]]: No subject yet
[[Christian Rechberger]]: About new cipher design
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:20
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14-January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15-January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''15-January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
431c545448c41b7610b26e2579de28278dc74202
554
553
2014-12-26T08:16:42Z
Joan
3
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements, part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements, part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security, part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security, part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14-January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15-January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''15-January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
429034ea3f64f027f47f6c4ab0aa920ebde78413
555
554
2014-12-28T11:22:16Z
Joan
3
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements, part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements, part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security, part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security, part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
17:10 - 17:40 ''Break''
[[Petr Susil]]: On algebraic attacks
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14-January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15-January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''15-January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
f3e96109a60a22c6a3ed2653e7e71f19c116c48c
563
555
2014-12-31T16:36:42Z
Joan
3
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements, part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements, part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security, part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security, part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: No subject yet
17:10 - 17:40 ''Break''
[[Petr Susil]]: On algebraic attacks
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14-January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15-January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''15-January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
903a8c312e7b2c55af594dbb5008115c73811ede
564
563
2015-01-02T13:41:57Z
Joan
3
wikitext
text/x-wiki
== '''12-January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security, part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security, part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13-January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: No subject yet
17:10 - 17:40 ''Break''
[[Petr Susil]]: On algebraic attacks
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14-January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15-January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16-January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
953e52d704571b3849e26ef86465a216513c8d40
565
564
2015-01-02T13:42:35Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security, part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security, part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: No subject yet
17:10 - 17:40 ''Break''
[[Petr Susil]]: On algebraic attacks
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
08373024559b7b5871a9b95ac6396c9a21a6d868
566
565
2015-01-03T17:07:29Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: No subject yet
17:10 - 17:40 ''Break''
[[Petr Susil]]: On algebraic attacks
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
20403cdd0484c1f4f8515564df2c6d588f40cb9b
567
566
2015-01-04T14:17:33Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: No subject yet
17:10 - 17:40 ''Break''
[[Petr Susil]]: On algebraic attacks
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
253203422966f40c6db0f53ef118314c38bf67bd
568
567
2015-01-05T12:20:59Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
[[Maria Naya-Plasencia]]: On impossible differential attacks
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
f557528ec1e44bf103c5fde74ccba12728f39c94
573
568
2015-01-06T15:11:28Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Kaisa Nyberg]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
354ec0b77ba99c0bf517ef540f8f68994385aef8
576
573
2015-01-07T14:46:48Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: On modular keyed sponge security proofs
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Kaisa Nyberg]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
021075bdcb782e2814cd86d910d927d2f00c31f5
577
576
2015-01-08T17:47:09Z
Joan
3
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Kaisa Nyberg]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
b6d230fdd0c3b1b99c6242cf59b0d5775b0d66c0
579
577
2015-01-09T09:19:07Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Kaisa Nyberg]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
0cb4c0f363185103e72d7e129b20b7793adb368f
580
579
2015-01-09T10:56:03Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Kaisa Nyberg]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
1fae1cc6e8e76f07a2752b2845ce93da029600ff
581
580
2015-01-09T16:49:32Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: On white-box cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Kaisa Nyberg]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
622efd673f1a11a712e18f40119bb2020aaf2824
582
581
2015-01-10T18:02:08Z
Joan
3
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Kaisa Nyberg]]: No subject yet
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
465fe6269d736e247d0c0f836761f804270bfabd
584
582
2015-01-10T18:07:20Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
[[Kaisa Nyberg]]: No subject yet
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:30 - 17:00.
Arrive back at the hotel at 17:40
18:00 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
765dd954ed876304d8501a6532cfafbee7037e76
586
584
2015-01-12T08:38:17Z
Alex
2
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function OR Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
[[Kaisa Nyberg]]: No subject yet
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
ecfd93b5b373b019a0d177995ef146c9e1667804
587
586
2015-01-12T08:42:33Z
Joan
3
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Léo Paul Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
[[Kaisa Nyberg]]: No subject yet
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
9d8243c3c3a6be3b06f5a59053a09075b253fb0f
Nav:Participants
0
417
546
2014-12-08T14:41:55Z
Yann
1
Created page with "List of participants: *Andrey Bogdanov"
wikitext
text/x-wiki
List of participants:
*Andrey Bogdanov
b0584712f187806b06e574f41dfe39b2c3682b42
547
546
2014-12-08T14:48:14Z
Yann
1
wikitext
text/x-wiki
List of participants:
* Andrey Bogdanov
* Anne Canteaut
* Antoine Joux
* Bart Preneel
* Carlos Cid
* Cécile Pierrot
* Celine Blondeau
* Cristian Rechberger
* Damian Vizar
* Dmitry Khovratovich
* Eik List
* Elena Andreeva
* Eli Biham
* Farzaneh Abed
* Florian Mendel
* François-Xavier Standaert
* Frederik Armknecht
* Gaetan Leurent
* Gildas Avoine
* Gilles Van Assche
* Gregor Leander
* Guido Bertoni
* Henri Gilbert
* Itai Dinur
* Jean-Philippe Aumasson
* Kaisa Nyberg
* Kan Yasuda
* [Kasumaru Aoki
* Leo Perrin
* Maria Naya-Plasencia
* Michael Peeters
* Orr Dunkelman
* Petr Susil
* Reza Reyhanitabar
* Steve Babbage
* Tetsu Iwata
* Thomas Peyrin
* Vesselin Velichkov
* Willi Meier
* Yu Sasaki
* Alex Biryukov
* Joan Daemen
* Stefan Lucks
* Serge Vaudenay
72c26a85301e222060880044a5d16e76b59c52f9
548
547
2014-12-08T14:49:07Z
Yann
1
Replaced content with "List of participants:
* Andrey Bogdanov
* Anne Canteaut
* Antoine Joux"
wikitext
text/x-wiki
List of participants:
* Andrey Bogdanov
* Anne Canteaut
* Antoine Joux
bfa8c398a2069cbb7c6c8a68074fd95b644dc6d1
549
548
2014-12-08T14:49:23Z
Yann
1
wikitext
text/x-wiki
List of participants:
* Andrey Bogdanov
* Anne Canteaut
* Antoine Joux
* Bart Preneel
485360d888028993ba78f806d9c272d56df55869
550
549
2014-12-08T14:49:43Z
Yann
1
wikitext
text/x-wiki
List of participants:
* Andrey Bogdanov
* Anne Canteaut
* Antoine Joux
* Bart Preneel
* Carlos Cid
* Cécile Pierrot
* Celine Blondeau
* Cristian Rechberger
* Damian Vizar
* Dmitry Khovratovich
* Eik List
* Elena Andreeva
* Eli Biham
* Farzaneh Abed
* Florian Mendel
* François-Xavier Standaert
* Frederik Armknecht
* Gaetan Leurent
* Gildas Avoine
* Gilles Van Assche
* Gregor Leander
* Guido Bertoni
* Henri Gilbert
* Itai Dinur
8d5e1dee595d0734e5f59ff30900e5292c499e59
551
550
2014-12-08T14:50:00Z
Yann
1
wikitext
text/x-wiki
List of participants:
* Andrey Bogdanov
* Anne Canteaut
* Antoine Joux
* Bart Preneel
* Carlos Cid
* Cécile Pierrot
* Celine Blondeau
* Cristian Rechberger
* Damian Vizar
* Dmitry Khovratovich
* Eik List
* Elena Andreeva
* Eli Biham
* Farzaneh Abed
* Florian Mendel
* François-Xavier Standaert
* Frederik Armknecht
* Gaetan Leurent
* Gildas Avoine
* Gilles Van Assche
* Gregor Leander
* Guido Bertoni
* Henri Gilbert
* Itai Dinur
* Jean-Philippe Aumasson
* Kaisa Nyberg
* Kan Yasuda
* Kasumaru Aoki
* Leo Perrin
* Maria Naya-Plasencia
* Michael Peeters
* Orr Dunkelman
* Petr Susil
* Reza Reyhanitabar
* Steve Babbage
* Tetsu Iwata
* Thomas Peyrin
* Vesselin Velichkov
* Willi Meier
* Yu Sasaki
* Alex Biryukov
* Joan Daemen
* Stefan Lucks
* Serge Vaudenay
51616453d5e77605572c3cebc02e252e3dfbb3a4
ESC 2015
0
3
552
533
2014-12-26T08:14:45Z
Joan
3
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here is the [https://www.cryptolux.org/mediawiki-esc2015/index.php/Seminar_program seminar program]
=== Proceedings ===
There will be electronic proceedings like last time, with ISBN and open access license.
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by the [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|200px|FNR logo]] [[Image:LACS-logo.jpg|200px|LACS logo]]
0f2958993da860f8afed66e5426f4ad78d4a5c25
Willi Meier
0
418
556
2014-12-28T11:23:27Z
Joan
3
Created page with " Title: Fast correlation attacks over extension fields Joint work with Bin Zhang and Chao Xu Abstract: Existing fast correlation attacks can be efficient but are not partic..."
wikitext
text/x-wiki
Title: Fast correlation attacks over extension fields
Joint work with Bin Zhang and Chao Xu
Abstract: Existing fast correlation attacks can be efficient but are not particularly suited for the analysis of more recent word oriented stream ciphers. It has been open for several years how to devise fast correlation attacks over extension fields to adapt to such analysis. The aim is to present the necessary steps to bridge this gap. A formal framework for fast correlation attacks over extension fields is constructed. Second, an efficient algorithm to compute large-unit distributions of a broad class of functions is proposed that allows to find better linear approximations than with algorithms for bitwise linear approximations. The methods are applied to the stream cipher SNOW 2.0 to give a fast correlation attack that improves over existing attacks by a factor of more than 2^40.
6b2ccdfb2f777bcaa2209b84802e115b56f5b140
Dmitry Khovratovich
0
419
557
2014-12-28T11:25:09Z
Joan
3
Created page with "Title: Design and analysis of memory-hard functions Abstract: Practical attacks on password hashing/key derivation schemes and emergence of dedicated hardware rigs for crypt..."
wikitext
text/x-wiki
Title: Design and analysis of memory-hard functions
Abstract:
Practical attacks on password hashing/key derivation schemes and emergence of dedicated hardware rigs for cryptocurrency mining motivated the following problem:
"Design a fixed-input-length, preimage-resistant hash function such that it runs in fractions of seconds on modern desktops and servers, and the brute-force preimage search is not significantly cheaper on other architectures (GPUs, FPGAs, or even ASICs)."
We explore the state-of-the-art of this problem, discuss various issues of performance optimization and the cost metric for the adversaries, show new types of attacks arising in this context, and investigate the existing and prospective solutions from the cryptographic point of view.
From the attack point of view, we explore time-memory tradeoffs for memory-intensive password hashing schemes, which have been previously known in the framework of pebbling games on graphs. We outline several new cryptanalytic methods, which apply to two main classes of hashing schemes: those where memory access pattern is data-independent and those where it is data-dependent and is computed at runtime.
From the design point of view, we show how to use the logic and memory organization of the x86 architecture to maximize adversary's costs. We also demonstrate how to use multi-threading and read-only memory in the optimal and secure way.
339c4d648ed8356e4c44df31a26ba00f3b55e3a0
Reza Reyhanitabar
0
420
558
2014-12-28T11:25:59Z
Joan
3
Created page with "Title: Boosting OMD for Almost Free Authentication of Associated Data Abstract: We propose a new variant of OMD, called pure OMD (p-OMD), which inherits all desirable securit..."
wikitext
text/x-wiki
Title: Boosting OMD for Almost Free Authentication of Associated Data
Abstract: We propose a new variant of OMD, called pure OMD (p-OMD), which inherits all desirable security features of OMD while having a more compact structure, providing higher efficiency, and preserving authenticity against nonce-misusing attacks. The original OMD scheme, as submitted to the CAESAR competition, couples a single pass of a variant of the MD iteration with the counter-based XOR MAC algorithm to provide privacy and authenticity. Our improved p-OMD scheme dispenses with the XOR MAC algorithm and is “purely” based on the MD iteration. To process a message of $\ell$ blocks and associated data of $a$ blocks, OMD needs $\ell+a+2$ calls to the compression function while p-OMD only requires $\max\left\{\ell, a\right\}+2$ calls. Therefore, for a typical case where $\ell \geq a$, p-OMD makes just $\ell+2$ calls to the compression function; that is, associated data is processed almost freely compared to OMD. We prove the security of p-OMD under the same standard assumption (pseudo-randomness of the compression function) as made in OMD; moreover, the security bound for p-OMD is the same as that of OMD, showing that the modifications made to boost the performance are without any loss of security. Furthermore, p-OMD has a (partial) level of misuse-resistance to nonce reuse that is lacked in OMD; namely, under nonce reuse p-OMD can still provide authenticity (albeit up to a degraded bound) but OMD cannot.
3b7e1abde843a2e86127198fc7bb8920167c1faa
Farzaneh Abed
0
421
559
2014-12-28T11:26:40Z
Joan
3
Created page with "Farzaneh Abed: Overview of the CAESAR Candidates for Authenticated Encryption Abstract: The ongoing CAESAR competition aims at finding authenticated encryption schemes that o..."
wikitext
text/x-wiki
Farzaneh Abed: Overview of the CAESAR Candidates for Authenticated Encryption
Abstract: The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 50 remaining first-round submissions go through an intensive review, analysis and comparison process. While the cryptographic community benefits greatly from the manifold different submission designs, their pure number implies a challenging amount of study. As part of a remedy, we provide an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings of the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream-cipher-, permutation-/sponge-, compression-function-based, dedicated).
d4e1b03fb846b475c2ff2b7f62315dee884312bc
Gildas Avoine
0
422
560
2014-12-28T11:27:36Z
Joan
3
Created page with "Title: Time-memory Trade-off Applied to Non-uniform Distributions Abstract: Cryptanalytic time-memory trade-offs (TMTO) were introduced by Hellman in 1980 in order to perform..."
wikitext
text/x-wiki
Title: Time-memory Trade-off Applied to Non-uniform Distributions
Abstract: Cryptanalytic time-memory trade-offs (TMTO) were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems. A major advance was presented at Crypto 2003 by Oechslin, with the rainbow tables that outperform Hellman's seminal work. After introducing the cryptanalytic time-memory trade-offs, we will present in this talk a technique to improve the efficiency of TMTOs when considering non-uniform distributions, e.g. to crack non-uniformly distributed passwords.
c4c346272c1ade44808aaab1099bc1c69a40df4b
Frederik Armknecht
0
423
561
2014-12-28T11:28:22Z
Joan
3
Created page with "Title: On Lightweight Stream Ciphers with Shorter Internal States Abstract: To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule of thumb ..."
wikitext
text/x-wiki
Title: On Lightweight Stream Ciphers with Shorter Internal States
Abstract:
To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule of thumb says that the internal state size of a stream cipher should be at least twice the security parameter. As memory gates are usually the most area and power consuming components, this implies a sever limitation with respect to possible lightweight implementations.
In this talk, we revisit this rule. We argue that a simple shift in the established design paradigm, namely to involve the fixed secret key not only in the initialization process but in the keystream generation phase as well, enables stream ciphers with smaller area size for two reasons. First, it improves the resistance against the mentioned TMDTO attacks which allows to choose smaller state sizes. Second, one can make use of the fact that storing a fixed value (here: the key) requires less area size than realizing a register of the same length. We demonstrate the feasibility of this approach by describing and implementing a concrete stream cipher which uses significantly less area than comparable existing lightweight stream ciphers.
1b1ad46593edec54e221a20f8e922a50086c2a9d
Yu Sasaki
0
424
569
2015-01-05T12:21:57Z
Joan
3
Created page with "IV-FV Authenticated Encryption and Triplet-Robust Decryption Abstract We study the nonce-based authenticated encryption where the sender does not transmit the initializatio..."
wikitext
text/x-wiki
IV-FV Authenticated Encryption and Triplet-Robust Decryption
Abstract
We study the nonce-based authenticated encryption where the sender does not transmit the
initialization vector $\IV$ (the nonce) but instead transmits the corresponding finalization vector
$\FV$ in a communication channel, possibly along with associated data~$A$, tag $T$ and
ciphertext~$C$. Here, $\FV$ should not be merely ``enciphered $\IV$\,'' but be properly generated
from~$\IV$, $A$ and plaintext~$M$. A receiver then (hopefully) checks the integrity of quadruplet
$(\FV,A,T,C)$ and (hopefully with successful verification) recovers the plaintext $M$ by decrypting
$(\FV,A,T,C)$. This paper presents a generic method named tag feedback, which converts a
conventional nonce-based scheme to an IV-FV one with just a single invocation of a tweakable block
cipher. The tag feedback substantially improves the robustness of the scheme: now the resulting
IV-FV scheme remains secure even if the decryption algorithm is compelled to release unverified
plaintext~$M$, as long as the accompanying triplet $(\FV,A,T)$ is new.
810f31a5922cdb375a9afdb06d4ec4156d5a860a
570
569
2015-01-05T12:24:13Z
Joan
3
wikitext
text/x-wiki
IV-FV Authenticated Encryption and Triplet-Robust Decryption
Abstract
We study the nonce-based authenticated encryption where the sender does not transmit the initialization vector IV (the nonce) but instead transmits the corresponding finalization vector FV in a communication channel, possibly along with associated data A, tag T and ciphertext C. Here, FV should not be merely ``enciphered IV,'' but be properly generated from IV, A and plaintext M. A receiver then (hopefully) checks the integrity of quadruplet (FV,A,T,C) and (hopefully with successful verification) recovers the plaintext M by decrypting (FV,A,T,C). This paper presents a generic method named tag feedback, which converts a
conventional nonce-based scheme to an IV-FV one with just a single invocation of a tweakable block cipher. The tag feedback substantially improves the robustness of the scheme: now the resulting IV-FV scheme remains secure even if the decryption algorithm is compelled to release unverified plaintext M, as long as the accompanying triplet (FV,A,T) is new.
02a483498588d618f74e2650599a0173fd85b052
571
570
2015-01-05T12:25:02Z
Joan
3
wikitext
text/x-wiki
Title: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Abstract: We study the nonce-based authenticated encryption where the sender does not transmit the initialization vector IV (the nonce) but instead transmits the corresponding finalization vector FV in a communication channel, possibly along with associated data A, tag T and ciphertext C. Here, FV should not be merely ``enciphered IV,'' but be properly generated from IV, A and plaintext M. A receiver then (hopefully) checks the integrity of quadruplet (FV,A,T,C) and (hopefully with successful verification) recovers the plaintext M by decrypting (FV,A,T,C). This paper presents a generic method named tag feedback, which converts a
conventional nonce-based scheme to an IV-FV one with just a single invocation of a tweakable block cipher. The tag feedback substantially improves the robustness of the scheme: now the resulting IV-FV scheme remains secure even if the decryption algorithm is compelled to release unverified plaintext M, as long as the accompanying triplet (FV,A,T) is new.
9029e934621d0c664a17533a4b417ccb9370f66d
List of participants
0
407
572
534
2015-01-06T08:10:11Z
Alex
2
wikitext
text/x-wiki
=== Participants ===
*[[Andrey Bogdanov]]
*[[Anne Canteaut]]
*[[Antoine Joux]]
*[[Bart Preneel]]
*[[Carlos Cid]]
*[[Cécile Pierrot]]
*[[Celine Blondeau]]
*[[Cristian Rechberger]]
*[[Damian Vizar]]
*[[Dmitry Khovratovich]]
*[[Eik List]]
*[[Elena Andreeva]]
*[[Farzaneh Abed]]
*[[Florian Mendel]]
*[[François-Xavier Standaert]]
*[[Frederik Armknecht]]
*[[Gaetan Leurent]]
*[[Gildas Avoine]]
*[[Gilles Van Assche]]
*[[Gregor Leander]]
*[[Guido Bertoni]]
*[[Henri Gilbert]]
*[[Itai Dinur]]
*[[Jean-Philippe Aumasson]]
*[[Kaisa Nyberg]]
*[[Kan Yasuda]]
*[[Kasumaru Aoki]]
*[[Leo Perrin]]
*[[Maria Naya-Plasencia]]
*[[Michael Peeters]]
*[[Petr Susil]]
*[[Peter Ryan]]
*[[Reza Reyhanitabar]]
*[[Tetsu Iwata]]
*[[Thomas Peyrin]]
*[[Vesselin Velichkov]]
*[[Willi Meier]]
*[[Yu Sasaki]]
*[[Alex Biryukov]]
*[[Joan Daemen]]
*[[Stefan Lucks]]
*[[Serge Vaudenay]]
9f2bdaec0381ce961cbe7f39a3890abedb98024c
Léo Paul Perrin
0
425
574
2015-01-06T15:12:11Z
Joan
3
Created page with "Title: ''not available'' Abstract: The design criteria and/or the structure of an S-Box may be secret, for instance in the case of a white-box implementation. In this talk, w..."
wikitext
text/x-wiki
Title: ''not available''
Abstract: The design criteria and/or the structure of an S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
16f8684a722b1ecfc73433b1e85d16909b2a9b97
Gilles Van Assche
0
426
578
2015-01-08T17:47:47Z
Joan
3
Created page with "Title: Generic security of the keyed sponge Abstract: Sponge functions can be used in keyed modes, for various applications such as authentication and (authenticated) encrypt..."
wikitext
text/x-wiki
Title: Generic security of the keyed sponge
Abstract: Sponge functions can be used in keyed modes, for various applications such as authentication and (authenticated) encryption. In this talk, we focus on the generic security of the sponge construction in such modes. We define the outer and inner keyed sponges and bound the probability that they can be distinguished from a random oracle. We speak about the multiplicity and show how to use it to get tight security bounds. Finally, we discuss multi-target scenarios with many independent keys.
b85b273b6fcb7e8a9a6ee9d8854853ba3d8dd1c4
Michaël Peeters
0
427
583
2015-01-10T18:03:36Z
Joan
3
Created page with "Title: Challenges in White-Box Cryptography The talk will cover basic aspects of white-box cryptography from an industry perspective and will conclude with a few questions to..."
wikitext
text/x-wiki
Title: Challenges in White-Box Cryptography
The talk will cover basic aspects of white-box cryptography from an industry perspective and will conclude with a few questions to raise interest in the cryptography community.
1a2855127f04580cc8dbe9b4bd8d87797fa83bb9
Eik List
0
428
585
2015-01-10T18:08:12Z
Joan
3
Created page with "Title: RIV: Decryption-Misuse-Resistant SIV Abstract: In 2006, Rogaway and Shrimpton introduced the well-known deterministic AE scheme SIV, primarily to encrypt high-entropy ..."
wikitext
text/x-wiki
Title: RIV: Decryption-Misuse-Resistant SIV
Abstract: In 2006, Rogaway and Shrimpton introduced the well-known deterministic AE scheme SIV, primarily to encrypt high-entropy plaintexts such as cryptographic keys. In the light of misuse-resistance, Fleischmann et al. showed at FSE'2012 that SIV's privacy breaks if an adversary gets access to would-be plaintexts. As a countermeasure, we introduce a decryption-misuse resistant version of SIV, called Robust IV or RIV.
0ad8d806afd49b207496aa48a88f7c256f6889db
User:Yann
2
435
594
2015-01-12T10:10:13Z
Yann
1
Created page with "Hi, everybody! <br>I'm Danish male :). <br>I really love RC cars!<br><br>Look into my blog post :: [http://goldenboy.me/members/lucieboothmanc/activity/343738/ Bikinis]"
wikitext
text/x-wiki
Hi, everybody! <br>I'm Danish male :). <br>I really love RC cars!<br><br>Look into my blog post :: [http://goldenboy.me/members/lucieboothmanc/activity/343738/ Bikinis]
a10bb86150841797f28dc8c9269743f477afbd1e
629
594
2015-01-12T13:51:24Z
Yann
1
Yann moved page [[User:AbigailCrowe]] to [[User:Yann]]: Automatically moved page while merging the user "[[User:AbigailCrowe|AbigailCrowe]]" to "[[User:Yann|Yann]]"
wikitext
text/x-wiki
Hi, everybody! <br>I'm Danish male :). <br>I really love RC cars!<br><br>Look into my blog post :: [http://goldenboy.me/members/lucieboothmanc/activity/343738/ Bikinis]
a10bb86150841797f28dc8c9269743f477afbd1e
675
629
2015-01-14T08:54:08Z
Yann
1
Blanked the page
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Leo Perrin
0
468
627
2015-01-12T13:40:57Z
83.99.17.42
0
Created page with "Title: On reverse-engineering S-boxes with hidden design criteria or structure Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in th..."
wikitext
text/x-wiki
Title: On reverse-engineering S-boxes with hidden design criteria or structure
Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
bf63f413ce3a35ca2d337070b935f4b6c3fc02ab
654
627
2015-01-13T08:49:20Z
Guest
4
wikitext
text/x-wiki
Title: On reverse-engineering S-boxes with hidden design criteria or structure
Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
[https://www.cryptolux.org/index.php/ESC_2015_Challenge Link to the reverse-engineering challenge]
7aa8b9bd1d38ebad3ff888089bf364091aff0b2f
660
654
2015-01-13T13:21:50Z
Yann
1
wikitext
text/x-wiki
Title: On reverse-engineering S-boxes with hidden design criteria or structure
Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
[https://www.cryptolux.org/index.php/ESC_2015_Challenge Link to the reverse-engineering challenge]
Slides: [[File:Lpe-reverse-engineer.pdf]]
cabcd6b70866a2ab007aa3ea41ec7301db4cebd5
661
660
2015-01-13T13:24:54Z
Yann
1
wikitext
text/x-wiki
Title: On reverse-engineering S-boxes with hidden design criteria or structure
Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
[https://www.cryptolux.org/index.php/ESC_2015_Challenge Link to the reverse-engineering challenge]
Slides: [[Media:Lpe-reverse-engineer.pdf]]
875bc9822f5c1e8689cda308b13079ffa3d32a14
Seminar program
0
416
628
587
2015-01-12T13:44:52Z
83.99.17.42
0
Modified "Léo Paul Perrin" into "Leo Perrin" to have the correct link to the abstract.
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: No subject yet''' 15:10 - 17:10
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
17:10 - 17:40 ''Break''
'''Session 4: Cryptanalysis''' 17:40 - 19:00
[[Maria Naya-Plasencia]]: On impossible differential attacks
[[Petr Susil]]: On algebraic attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1:''' 9:00-10:00
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
[[Kaisa Nyberg]]: No subject yet
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[François-Xavier Standaert]]: No subject yet
[[Kazumaro Aoki]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
2b1351be18a507f62a3e27404a28dd9f21e70709
631
628
2015-01-12T13:54:49Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption''' 14:10 - 17:10
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
29933dbd7ae8452b8d0c9a675acb4ac5713fa37e
632
631
2015-01-12T13:56:21Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:10-10:40 ''Break''
'''Session 2: Cipher design''' 10:40-12:20
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
e42246ebde901b9890f3fa56bf396f2e417e8690
633
632
2015-01-12T13:57:31Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
7b11a11fae1521b2da9225199cdbf435bc2b55e6
634
633
2015-01-12T14:00:33Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
ab2a2ddcb1522596c4eb642afe98458dac7f2b85
635
634
2015-01-12T14:03:00Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
0564717163de1e6bf05a3bae66d90478dd28381a
636
635
2015-01-12T14:05:23Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair: Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
51ca3a80d302543221c15ec9852de6d8bed0301b
637
636
2015-01-12T14:08:41Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Bart Preneel)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2:''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
03d08d3f80bf9ac796ccf288c8339e72ad82f362
638
637
2015-01-12T14:09:56Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Bart Preneel)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
b42243ed451850fafd05adea6adf6d35d1221b42
639
638
2015-01-12T14:13:43Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Bart Preneel)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Anne Canteaut)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
51ba5c15c0b49f47624f767720c85dd3bf2ca1df
640
639
2015-01-12T14:14:28Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Bart Preneel)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Anne Canteaut)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
6285d2c34279f271bca2901cd041393c08380b97
641
640
2015-01-12T14:41:23Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
18:20 [[Rump session]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
50b983aa3b408d026a47ca4b083c9bd9b32faa97
642
641
2015-01-12T15:00:43Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:10
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: No subject yet
10:10-10:40 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:40-12:10
[[Tetsu Iwata]]: On authenticated encryption
[[Kazumaro Aoki]]: No subject yet
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Bart Preneel]]: Post-Snowden crypto
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
2e9df14fd39f5009936f6e74ba8f8d36ba5722de
650
642
2015-01-12T21:19:18Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: No subject yet
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Carlos Cid]]: No subject yet
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: No subject yet
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
878e8f5f32fa57ccfe561c60c68e8cbb215cc340
651
650
2015-01-13T08:08:55Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Carlos Cid]]: No subject yet
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: No subject yet
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
94a13698c9b78da4628556d7e10edeffc9581ba7
652
651
2015-01-13T08:10:42Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Carlos Cid]]: No subject yet
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
19faface68ec10cc9487b341fa60f79c15a90dda
658
652
2015-01-13T13:15:34Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2:''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: No subject yet
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
f90afec9b6969b0816c33093502b7e3192dcac6d
662
658
2015-01-13T14:23:48Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
7cf1bb34e0268439352c122e48c70cefcb814dda
663
662
2015-01-13T14:24:59Z
Alex
2
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge Reverse-engineering challenge]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
3b2fda6583a412d061495a3279bfd61341d667da
664
663
2015-01-13T14:25:25Z
Alex
2
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3:''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
7d9b320185ae1c121044b0f2710a592832cae0f0
665
664
2015-01-13T14:26:17Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1:''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
9bca4f08dc8a6ca6818378098fffeaa48436531b
666
665
2015-01-13T14:27:24Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4:''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
0b33a38506499bd3fcc3db027ade684afcc0e141
667
666
2015-01-13T14:30:00Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
670ce9ea4b04e6ba024ee95c1ac8bee7d889baa4
670
667
2015-01-13T18:05:32Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will to the Vianden Castle.
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
51098fe1efcd97899ed12278e2143a2bc2f2c73f
671
670
2015-01-13T23:10:02Z
Alex
2
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: No subject yet
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
a50b584bd432914c4640dc2993241a1745a8202d
672
671
2015-01-14T05:47:33Z
Joan
3
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
4f99d5b737d5f71da6210003790e981a8706abc0
673
672
2015-01-14T08:14:51Z
Joan
3
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
[[Preliminary list of speakers]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
9e083dca51032740501e14800b056bbfad1afff4
Cécile Pierrot
0
470
643
2015-01-12T15:13:17Z
Guest
4
Created page with " == '''Title :''' Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logarithm Algorithms in Small Characteristic Finite Fields. == '''Abstract :''' Publi..."
wikitext
text/x-wiki
== '''Title :''' Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logarithm Algorithms in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP).
In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simply :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate in practice all discrete logarithms computations in this small characteristic configuration.
aa4abff078f8ec71c4d1b3ea159aa3f145e5fa5a
644
643
2015-01-12T15:20:49Z
Guest
4
/* Title : Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logarithm Algorithms in Small Characteristic Finite Fields. */
wikitext
text/x-wiki
== '''Title :''' Let's play with Discrete Logarithm !
Simplified Settings for Discrete Logarithm Algorithms in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP).
In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simply :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
9ed18564808a1c103c074d3adda2290860ffa839
645
644
2015-01-12T15:21:49Z
Guest
4
wikitext
text/x-wiki
== '''Title :''' Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logs in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP).
In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simply :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
f01ca3923fe62a064ef95395388b0d894e90f551
646
645
2015-01-12T15:22:38Z
Guest
4
/* Title : Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logs in Small Characteristic Finite Fields. */
wikitext
text/x-wiki
== '''Title :''' Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logs in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP). In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h.''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simply :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
8305fcd2fa9cda9c105f1017b5b8100db87a4f14
647
646
2015-01-12T15:22:55Z
Guest
4
/* Title : Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logs in Small Characteristic Finite Fields. */
wikitext
text/x-wiki
== '''Title :''' Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logs in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP). In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h.''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simply :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
7a9a8c1ceea10c2641170826d1b31c703671f434
648
647
2015-01-12T15:29:23Z
Guest
4
/* Title : Let's play with Discrete Logarithm ! Simplified Settings for Discrete Logs in Small Characteristic Finite Fields. */
wikitext
text/x-wiki
== '''Title :''' Simplified Settings for Discrete Logarithm in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP). In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h.''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simply :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
8efe6524396ff0c655011c4aa7b95cc14675c319
649
648
2015-01-12T15:31:40Z
Guest
4
/* Title : Simplified Settings for Discrete Logarithm in Small Characteristic Finite Fields. */
wikitext
text/x-wiki
== '''Title :''' Simplified Settings for Discrete Logarithm in Small Characteristic Finite Fields. ==
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP). In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h.''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simple :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
c7439eb1148bb7fab04cf2c11ca1214d03737ef9
List of participants
0
407
653
572
2015-01-13T08:12:13Z
Joan
3
/* Participants */
wikitext
text/x-wiki
=== Participants ===
*[[Andrey Bogdanov]]
*[[Anne Canteaut]]
*[[Antoine Joux]]
*[[Bart Preneel]]
*[[Carlos Cid]]
*[[Cécile Pierrot]]
*[[Celine Blondeau]]
*[[Cristian Rechberger]]
*[[Damian Vizar]]
*[[Dmitry Khovratovich]]
*[[Eik List]]
*[[Elena Andreeva]]
*[[Farzaneh Abed]]
*[[Florian Mendel]]
*[[François-Xavier Standaert]]
*[[Frederik Armknecht]]
*[[Gaetan Leurent]]
*[[Gildas Avoine]]
*[[Gilles Van Assche]]
*[[Gregor Leander]]
*[[Guido Bertoni]]
*[[Henri Gilbert]]
*[[Itai Dinur]]
*[[Jean-Philippe Aumasson]]
*[[Kaisa Nyberg]]
*[[Kan Yasuda]]
*[[Kazumaro Aoki]]
*[[Leo Perrin]]
*[[Maria Naya-Plasencia]]
*[[Michael Peeters]]
*[[Petr Susil]]
*[[Peter Ryan]]
*[[Reza Reyhanitabar]]
*[[Tetsu Iwata]]
*[[Thomas Peyrin]]
*[[Vesselin Velichkov]]
*[[Willi Meier]]
*[[Yu Sasaki]]
*[[Alex Biryukov]]
*[[Joan Daemen]]
*[[Stefan Lucks]]
*[[Serge Vaudenay]]
17a44f6f7fb5b67d50ee7b61c302fa1e4b64f8f0
Celine Blondeau
0
471
655
2015-01-13T08:54:16Z
Guest
4
Created page with "In this talk, we present some experimental results on multidimensional zero-correlation linear attacks and multiple zero-correlation linear attack. We show how, considering di..."
wikitext
text/x-wiki
In this talk, we present some experimental results on multidimensional zero-correlation linear attacks and multiple zero-correlation linear attack. We show how, considering distinct known plaintexts, we can improve the complexity of multiple zero-correlation attacks.
Some open questions related to the relation between differential and linear attacks are also discussed.
b36c573f3a2853e24282707e0ff63a776f6bae85
657
655
2015-01-13T08:56:54Z
Guest
4
wikitext
text/x-wiki
Céline Blondeau: Remarks on the data complexity of some statistical attacks
In this talk, we present some experimental results on multidimensional zero-correlation linear attacks and multiple zero-correlation linear attack. We show how, considering distinct known plaintexts, we can improve the complexity of multiple zero-correlation attacks.
Some open questions related to the relation between differential and linear attacks are also discussed.
97d0c506c147903934dfdb0e43b5a192d649a175
Céline Blondeau
0
472
656
2015-01-13T08:55:39Z
Guest
4
Created page with "Céline Blondeau: Remarks on the data complexity of some statistical attacks In this talk, we present some experimental results on multidimensional zero-correlation linear at..."
wikitext
text/x-wiki
Céline Blondeau: Remarks on the data complexity of some statistical attacks
In this talk, we present some experimental results on multidimensional zero-correlation linear attacks and multiple zero-correlation linear attack. We show how, considering distinct known plaintexts, we can improve the complexity of multiple zero-correlation attacks.
Some open questions related to the relation between differential and linear attacks are also discussed.
97d0c506c147903934dfdb0e43b5a192d649a175
File:Lpe-reverse-engineer.pdf
6
473
659
2015-01-13T13:21:03Z
Yann
1
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Kaisa Nyberg
0
474
668
2015-01-13T16:55:52Z
Guest
4
Created page with "Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis o..."
wikitext
text/x-wiki
Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
2a2de65038d0f61e5ef4cb23537795899064e18d
669
668
2015-01-13T17:04:28Z
Guest
4
wikitext
text/x-wiki
''Title:'' Reverse-Engineering Hidden Assumptions in Differential-Linear Attacks
''Abstract:'' Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
5fe636c987877b35bd63706f35cc1169424fae53
Rump session
0
475
674
2015-01-14T08:16:43Z
Joan
3
Created page with "Willi Meier Yu Sasaki Gregor Leander Henri Gilbert Damien Vizar Yu Sasaki again Christian Rechberger Leo Perrin"
wikitext
text/x-wiki
Willi Meier
Yu Sasaki
Gregor Leander
Henri Gilbert
Damien Vizar
Yu Sasaki again
Christian Rechberger
Leo Perrin
2850c1fc5a03b1d8e6b1f5f3b4be492ac77b46e3
676
674
2015-01-14T09:52:21Z
Guest
4
wikitext
text/x-wiki
Willi Meier
Yu Sasaki
Gregor Leander
Henri Gilbert
Damian Vizar
Yu Sasaki again
Christian Rechberger
Leo Perrin
Thomas Peyrin
Gaetan Leurent
e1484e1fd1118615182d6b747e5e4aefebf4da98
Seminar program
0
416
677
673
2015-01-14T09:57:20Z
Guest
4
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of some statistical attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
[[Preliminary list of speakers]]. Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
2358304cd69d67803043b4e32b15505adf8f4ba7
678
677
2015-01-14T10:12:04Z
Guest
4
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
[[Preliminary list of speakers]]. Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
b7fd9915b3de4f95cd3b913d925329d011348883
684
678
2015-01-14T13:15:52Z
Guest
4
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
832b2eadd0063b59aa5b49989362ed2599643a5e
691
684
2015-01-14T21:49:38Z
Alex
2
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Paranoia or not? (Chair Serge Vaudenay)''' 9:00-10:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Bart Preneel]]: Post-Snowden crypto
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Tetsu Iwata]]: On authenticated encryption
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
''Closing ESC2015''
12:30-14:00 ''Lunch''
f4e2590dd8f2f613439bee7901f948b0af36006e
695
691
2015-01-15T07:48:57Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Authenticated encryption (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1:''' 9:00-10:25
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
''Closing ESC2015''
12:30-14:00 ''Lunch''
67cb089d5c78e2618e8f5da645938ef2c6b03cdc
697
695
2015-01-15T07:50:36Z
Joan
3
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Crypanalysis''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
53f62af2523445cba77520d80418393842890e02
698
697
2015-01-15T07:50:59Z
Joan
3
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Crypanalysis''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2:''' 10:50-12:20
''Closing ESC2015''
12:30-14:00 ''Lunch''
bcc0ba07254d43360616e770028d4a400ad6ed27
699
698
2015-01-15T07:52:44Z
Joan
3
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: more on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
3e4b274020395cb038cc2b8a1b0df79e096a80ee
700
699
2015-01-15T07:53:34Z
Joan
3
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
624aa33c3186508ceba5ed1e3d0f78038a6792d9
704
700
2015-01-15T09:59:22Z
Guest
4
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
66dbdbf19c6e50c106c0124dac4739de685e16e8
708
704
2015-01-15T10:04:39Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides on ShiftRows]]] [[media:Simon_esc2015.pdf|[slides on SIMON]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
ab327106acb3f07f52cd2ca5291e08efb544dc9e
709
708
2015-01-15T10:05:20Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu)
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
d57dff6ee194740b0ba76c05ab9a63eaec714f28
711
709
2015-01-15T10:07:15Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
115d673163167be75362ba1950ba09c53c34043f
713
711
2015-01-15T10:09:54Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
cd136179453667eac04a817c2bacc7c98ef73eaa
716
713
2015-01-15T10:11:17Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
7e0a088ada76ae0157ed04e03f5fd9b6a312ca0f
719
716
2015-01-15T10:13:57Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
b986fc423625ccbd2e9f63d5c2b0146c869b07d4
723
719
2015-01-15T10:16:13Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
4a503b15a6a72cd30f321b48f748ac1b0dc4b0da
725
723
2015-01-15T10:23:32Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
279365ea5b0a2b72e0379de9b315a1fb2cc7f75c
Celine Blondeau
0
471
679
657
2015-01-14T10:13:22Z
Guest
4
wikitext
text/x-wiki
Céline Blondeau: Remarks on the data complexity of zero-correlation linear attacks
In this talk, we present some experimental results on multidimensional zero-correlation linear attacks and multiple zero-correlation linear attack. We show how, considering distinct known plaintexts, we can improve the complexity of multiple zero-correlation attacks.
0428ac8d00f88143d2decaaa45d7cea3e7992aca
Rump session
0
475
680
676
2015-01-14T13:04:06Z
Guest
4
wikitext
text/x-wiki
Willi Meier
Yu Sasaki
Gregor Leander
Henri Gilbert
Damian Vizar
Christian Rechberger
Leo Perrin
Thomas Peyrin
Gaetan Leurent
Farzaneh Abed
8d68591f78f4139eacbe565021a25f3bfdc303bc
681
680
2015-01-14T13:09:31Z
Guest
4
wikitext
text/x-wiki
{|
|Willi Meier ||Higher order differentials in NORX
|-
|Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|Gregor Leander ||Decomposing ASASA
|-
|Henri Gilbert ||on padding oracle attacks
|-
|Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|Christian Rechberger ||TBC
|-
|Leo Perrin ||TBC
|-
|Thomas Peyrin ||TBC
|-
|Gaetan Leurent ||TBC
|-
|Farzaneh Abed ||TBC
|}
846db7c47c4e0821b9fe07dc75fa6503f2da6e46
682
681
2015-01-14T13:12:42Z
Guest
4
Guest moved page [[Preliminary list of speakers]] to [[Rump session]]: Better title
wikitext
text/x-wiki
{|
|Willi Meier ||Higher order differentials in NORX
|-
|Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|Gregor Leander ||Decomposing ASASA
|-
|Henri Gilbert ||on padding oracle attacks
|-
|Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|Christian Rechberger ||TBC
|-
|Leo Perrin ||TBC
|-
|Thomas Peyrin ||TBC
|-
|Gaetan Leurent ||TBC
|-
|Farzaneh Abed ||TBC
|}
846db7c47c4e0821b9fe07dc75fa6503f2da6e46
685
682
2015-01-14T13:23:56Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
|18h20||6 min||Willi Meier ||Higher order differentials in NORX
|-
|18h26||5 min||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|18h31||3 min||Gregor Leander ||Decomposing ASASA
|-
|18h36||5 min||Henri Gilbert ||on padding oracle attacks
|-
|18h42||6 min||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|18h47||5 min||Christian Rechberger ||TBC
|-
|18h52||5 min||Leo Perrin ||TBC
|-
|18h54||2 min||Thomas Peyrin ||TBC
|-
|18h59||5 min||Gaetan Leurent ||TBC
|-
|19h00||1 min||Farzaneh Abed ||TBC
|}
8873913dea63d68a04544a80d74753688baab5fa
686
685
2015-01-14T13:50:42Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title
|-
|18h20||6||Willi Meier ||Higher order differentials in NORX
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|-
|18h34||5||Henri Gilbert ||on padding oracle attacks
|-
|18h39||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|18h45||5||Christian Rechberger ||TBC
|-
|18h50||5||Leo Perrin ||TBC
|-
|18h52||2||Thomas Peyrin ||TBC
|-
|18h57||5||Gaetan Leurent ||TBC
|-
|19h02||1||Farzaneh Abed ||TBC
|-
|19h03
|colspan=3|''the end''
|}
19d7bb5cfe98e63d7ea0bc1c8cebcb9115103c49
687
686
2015-01-14T14:04:12Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|-
|18h34||5||Henri Gilbert ||On Padding Oracle Attacks
|-
|18h39||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|18h45||5||Christian Rechberger ||TBC
|-
|18h50||5||Leo Perrin ||TBC
|-
|18h52||2||Thomas Peyrin ||TBC
|-
|18h57||5||Gaetan Leurent ||TBC
|-
|19h02||1||Farzaneh Abed ||TBC
|-
|19h03
|colspan=3|''the end''
|}
ba274fadecf90dabf323373ef9c4a446b5e3fe82
689
687
2015-01-14T16:49:57Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|-
|18h34||6||Henri Gilbert ||On Padding Oracle Attacks
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|18h46||5||Christian Rechberger ||TBC
|-
|18h51||5||Leo Perrin ||TBC
|-
|18h53||2||Thomas Peyrin ||TBC
|-
|18h58||5||Gaetan Leurent ||TBC
|-
|19h03||1||Farzaneh Abed ||TBC
|-
|19h04
|colspan=3|''the end''
|}
168ddf020528dec1ed62c45fd2ae718eee8e5911
690
689
2015-01-14T16:50:46Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|-
|18h46||5||Christian Rechberger ||TBC
|-
|18h51||5||Leo Perrin ||TBC
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|-
|19h04
|colspan=3|''the end''
|}
fa7008d1304231cff432162e2792096d48282e40
Preliminary list of speakers
0
476
683
2015-01-14T13:12:42Z
Guest
4
Guest moved page [[Preliminary list of speakers]] to [[Rump session]]: Better title
wikitext
text/x-wiki
#REDIRECT [[Rump session]]
f987e9bf978837708bdcae9692f93c1dd444118d
Vesselin Velichkov
0
477
688
2015-01-14T16:48:02Z
Guest
4
Created page with "Title: On Improving the Data Complexity of Attacks on RC5 Joint work with Alex Biryukov Abstract: TBA"
wikitext
text/x-wiki
Title: On Improving the Data Complexity of Attacks on RC5
Joint work with Alex Biryukov
Abstract: TBA
e7c1b0576e29b37354d214e4ba3044c1af9e854e
List of participants
0
407
692
653
2015-01-14T21:56:37Z
Alex
2
wikitext
text/x-wiki
=== Participants ===
*[[Andrey Bogdanov]]
*[[Anne Canteaut]]
*[[Antoine Joux]]
*[[Bart Preneel]]
*[[Carlos Cid]]
*[[Cécile Pierrot]]
*[[Celine Blondeau]]
*[[Cristian Rechberger]]
*[[Damian Vizar]]
*[[Dmitry Khovratovich]]
*[[Eik List]]
*[[Elena Andreeva]]
*[[Farzaneh Abed]]
*[[Florian Mendel]]
*[[François-Xavier Standaert]]
*[[Frederik Armknecht]]
*[[Gaetan Leurent]]
*[[Gildas Avoine]]
*[[Gilles Van Assche]]
*[[Gregor Leander]]
*[[Henri Gilbert]]
*[[Itai Dinur]]
*[[Kaisa Nyberg]]
*[[Kan Yasuda]]
*[[Kazumaro Aoki]]
*[[Leo Perrin]]
*[[Maria Naya-Plasencia]]
*[[Michael Peeters]]
*[[Petr Susil]]
*[[Peter Ryan]]
*[[Reza Reyhanitabar]]
*[[Tetsu Iwata]]
*[[Thomas Peyrin]]
*[[Vesselin Velichkov]]
*[[Willi Meier]]
*[[Yu Sasaki]]
*[[Alex Biryukov]]
*[[Joan Daemen]]
*[[Stefan Lucks]]
*[[Serge Vaudenay]]
6fe8ce70c86634793103135788190139082cfded
Kazumaro Aoki
0
478
693
2015-01-15T07:48:29Z
Guest
4
Created page with "Title: Observations on Proest and Minalpher Abstract: This talk consists of two talks. The first part considers some property, and analyzes Proest and Minalpher sboxes. The..."
wikitext
text/x-wiki
Title: Observations on Proest and Minalpher
Abstract:
This talk consists of two talks. The first part considers some property, and analyzes Proest and Minalpher sboxes. The second part considers the implementation of the underlying primitive of Proest and Minalpher. Comments on Sandy/Ivy Bridge and Haswell/Broadwell are given.
a4651828523877e2617c971a4792937a885bb084
694
693
2015-01-15T07:48:51Z
Guest
4
wikitext
text/x-wiki
Title: Observations on Proest and Minalpher
Abstract:
This talk consists of two talks. The first part considers some property on sbox, and analyzes Proest and Minalpher sboxes. The second part considers the implementation of the underlying primitive of Proest and Minalpher. Comments on Sandy/Ivy Bridge and Haswell/Broadwell are given.
4971596b34234442c28433ebb0990609d558e60c
Kasumaru Aoki
0
479
696
2015-01-15T07:49:51Z
Guest
4
Created page with "See the contents from list of participants page."
wikitext
text/x-wiki
See the contents from list of participants page.
80499340d69620aea6dc25f5718c5d2f5725e731
File:Large-unit.pdf
6
480
701
2015-01-15T08:06:13Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Leo Perrin
0
468
702
661
2015-01-15T09:58:19Z
Guest
4
wikitext
text/x-wiki
Title: On reverse-engineering S-boxes with hidden design criteria or structure [[Media:Lpe-reverse-engineer.pdf|slides]]
Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
[https://www.cryptolux.org/index.php/ESC_2015_Challenge Link to the reverse-engineering challenge]
a841600cb8930d150f4e5f13d5f7a9fbe6640e47
703
702
2015-01-15T09:58:41Z
Guest
4
wikitext
text/x-wiki
Title: On reverse-engineering S-boxes with hidden design criteria or structure [[Media:Lpe-reverse-engineer.pdf|[slides]]]
Abstract: The design criteria and/or the structure of a S-Box may be secret, for instance in the case of a white-box implementation. In this talk, we discuss different methods which can be used to reverse-engineer the hidden structure of a S-Box or to at least discard with high probability that it was chosen uniformly at random. As an example, we study the S-Box of Skipjack.
[https://www.cryptolux.org/index.php/ESC_2015_Challenge Link to the reverse-engineering challenge]
aeacac34b7f35126f708b3643a68923330d4dbd9
File:ShiftRows esc2015.pdf
6
481
705
2015-01-15T10:01:18Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Simon esc2015.pdf
6
482
706
2015-01-15T10:03:08Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Gregor Leander
0
483
707
2015-01-15T10:04:09Z
Guest
4
Created page with "title: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides on ShiftRows]]..."
wikitext
text/x-wiki
title: Some insights in the Simon round function AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
[[media:ShiftRows_esc2015.pdf|[slides on ShiftRows]]] [[media:Simon_esc2015.pdf|[slides on SIMON]]]
e80ff0f1968401f95a46f8dd856b9c001f76efc1
Willi Meier
0
418
710
556
2015-01-15T10:06:58Z
Guest
4
wikitext
text/x-wiki
Title: Fast correlation attacks over extension fields [[media:Large-unit.pdf|[slides]]]
Joint work with Bin Zhang and Chao Xu
Abstract: Existing fast correlation attacks can be efficient but are not particularly suited for the analysis of more recent word oriented stream ciphers. It has been open for several years how to devise fast correlation attacks over extension fields to adapt to such analysis. The aim is to present the necessary steps to bridge this gap. A formal framework for fast correlation attacks over extension fields is constructed. Second, an efficient algorithm to compute large-unit distributions of a broad class of functions is proposed that allows to find better linear approximations than with algorithms for bitwise linear approximations. The methods are applied to the stream cipher SNOW 2.0 to give a fast correlation attack that improves over existing attacks by a factor of more than 2^40.
dc98c01bbc7607cd914bf82cb46012cc4955094f
File:NonUniformSharingAtESC.pdf
6
484
712
2015-01-15T10:09:04Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Joan Daemen
0
413
714
575
2015-01-15T10:10:09Z
Guest
4
wikitext
text/x-wiki
Title: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
Abstract:
We study threshold sharing schemes against DPA and investigate in what way the failure to meet the uniformity condition may jeopardize the immunity against first-order DPA.
For this we introduce a treatment of discrete distributions and vector Boolean mappings in the spectral domain using correlation matrices. We identify the characteristic properties of discrete distributions and mappings that are important in the macroscopic analysis: the total imbalance and imbalance contribution. We show that the total imbalance of the result of applying an iterated mapping to an input is the sum of the imbalance of that input plus the sum of the imbalances of the rounds of the iterated mappings. In the microscopic analysis we make use of (reduced) correlation matrices and imbalance vectors that are inherent in lossy mappings.
We apply our theory on non-uniform sharing and use the one for Keccak as a test bench for our techniques. In particular, we propose an new generic trick to address non-uniformity and show that its application makes any remaining imbalances unexploitable.
cbb01a632911a4eaec3b5c8fe1c09b36457add65
File:Pdf.pdf
6
485
715
2015-01-15T10:10:26Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Bart Preneel
0
486
717
2015-01-15T10:11:28Z
Guest
4
Created page with "title: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]"
wikitext
text/x-wiki
title: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
9c2d31963a37dc2cfd1a35d6ab9e10363d2a7bbb
File:KeyedSpongeAtESC.pdf
6
487
718
2015-01-15T10:13:03Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Gilles Van Assche
0
426
720
578
2015-01-15T10:14:08Z
Guest
4
wikitext
text/x-wiki
Title: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
Abstract: Sponge functions can be used in keyed modes, for various applications such as authentication and (authenticated) encryption. In this talk, we focus on the generic security of the sponge construction in such modes. We define the outer and inner keyed sponges and bound the probability that they can be distinguished from a random oracle. We speak about the multiplicity and show how to use it to get tight security bounds. Finally, we discuss multi-target scenarios with many independent keys.
73b01c77c1e56f3db9bdb387814b4d15c37ff586
File:ESC15.pdf
6
488
721
2015-01-15T10:15:28Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Maria Naya-Plasencia
0
489
722
2015-01-15T10:15:44Z
Guest
4
Created page with "title: On impossible differential attacks [[media:ESC15.pdf|[slides]]]"
wikitext
text/x-wiki
title: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
73126e5caacbbd8cd313e179480578fab5a547db
File:POMD.pdf
6
490
724
2015-01-15T10:22:27Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Reza Reyhanitabar
0
420
726
558
2015-01-15T10:23:41Z
Guest
4
wikitext
text/x-wiki
Title: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
Abstract: We propose a new variant of OMD, called pure OMD (p-OMD), which inherits all desirable security features of OMD while having a more compact structure, providing higher efficiency, and preserving authenticity against nonce-misusing attacks. The original OMD scheme, as submitted to the CAESAR competition, couples a single pass of a variant of the MD iteration with the counter-based XOR MAC algorithm to provide privacy and authenticity. Our improved p-OMD scheme dispenses with the XOR MAC algorithm and is “purely” based on the MD iteration. To process a message of $\ell$ blocks and associated data of $a$ blocks, OMD needs $\ell+a+2$ calls to the compression function while p-OMD only requires $\max\left\{\ell, a\right\}+2$ calls. Therefore, for a typical case where $\ell \geq a$, p-OMD makes just $\ell+2$ calls to the compression function; that is, associated data is processed almost freely compared to OMD. We prove the security of p-OMD under the same standard assumption (pseudo-randomness of the compression function) as made in OMD; moreover, the security bound for p-OMD is the same as that of OMD, showing that the modifications made to boost the performance are without any loss of security. Furthermore, p-OMD has a (partial) level of misuse-resistance to nonce reuse that is lacked in OMD; namely, under nonce reuse p-OMD can still provide authenticity (albeit up to a degraded bound) but OMD cannot.
a5a82976768acf3908ca550baffde7f41d0707ce
Andrey Bogdanov
0
410
727
537
2015-01-15T11:28:06Z
Guest
4
wikitext
text/x-wiki
This talk deals with the security of symmetric-key algorithms under Trojans. It was motivated by the recent revelations of Snowden about NSA's mass surveillance practices. We study the security of AES in the presence of a patronizing Trojan: We let a part of the state leak in each encryption/decryption. We apply state-of-the-art symmetric-key cryptanalyic techniques to evaluate the residual key-recovery security. We consider a wide spectrum of settings which range from Trojans with less control all the way to the more powerful adversaries with deeper knowledge of the execution environment. Rather surprisingly, we observe that the practical security of AES under those Trojans can be considerable, especially if countermeasures are in place.
Joint work with Takanori Isobe.
Contact: Andrey Bogdanov <anbog@dtu.dk>
510fdf9998ac8cd3eb369b21d023a3a7d1a8231d
774
727
2015-01-15T16:00:30Z
Guest
4
wikitext
text/x-wiki
title: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
Abstract: This talk deals with the security of symmetric-key algorithms under Trojans. It was motivated by the recent revelations of Snowden about NSA's mass surveillance practices. We study the security of AES in the presence of a patronizing Trojan: We let a part of the state leak in each encryption/decryption. We apply state-of-the-art symmetric-key cryptanalyic techniques to evaluate the residual key-recovery security. We consider a wide spectrum of settings which range from Trojans with less control all the way to the more powerful adversaries with deeper knowledge of the execution environment. Rather surprisingly, we observe that the practical security of AES under those Trojans can be considerable, especially if countermeasures are in place.
Joint work with Takanori Isobe.
Contact: Andrey Bogdanov <anbog@dtu.dk>
442b9c03683f5560b9cd0f6df6aa3873e69c208f
File:Rump willi.pdf
6
491
728
2015-01-15T11:29:09Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Rump session
0
475
729
690
2015-01-15T11:33:32Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title !! Slides
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|[[media:Rump willi.pdf|Slides]]
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|[[media:Rump gregor.pdf|Slides]]
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|[[media:Rump damian.pdf|Slides]]
|-
|18h46||5||Christian Rechberger ||TBC
|[[media:Rump christian.pdf|Slides]]
|-
|18h51||5||Leo Perrin ||TBC
|[[media:Rump leo.pdf|Slides]]
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|[[media:Rump thomas.pdf|Slides]]
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|[[media:Rump gaetan.pdf|Slides]]
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|[[media:Rump feri.pdf|Slides]]
|-
|19h04||2||Michael Peeters ||Quotes from NSA’s Cryptolog
|[[media:Rump mip.pdf|Slides]]
|-
|19h06
|colspan=3|''the end''
|}
0a7f9d8916457b2311b8036e993e92622e9ebf95
738
729
2015-01-15T11:38:40Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title !! Slides
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|[[media:rump_willi.pdf|Slides]]
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|[[media:rump_gregor.pdf|Slides]]
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|[[media:rump_damian.pdf|Slides]]
|-
|18h46||5||Christian Rechberger ||TBC
|[[media:rump_christian.pdf|Slides]]
|-
|18h51||5||Leo Perrin ||TBC
|[[media:rump_leo.pdf|Slides]]
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|[[media:rump_thomas.pdf|Slides]]
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|[[media:rump_gaetan.pdf|Slides]]
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|[[media:rump_feri.pdf|Slides]]
|-
|19h04||2||Michael Peeters ||Quotes from NSA’s Cryptolog
|[[media:rump_mip.pdf|Slides]]
|-
|19h06
|colspan=3|''the end''
|}
eedce9fa3291b9fce0739cc29dd16d4ade255f8b
739
738
2015-01-15T11:41:08Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title !! Slides
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|[[media:rump_willi.pdf|Slides]]
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|[[media:rump_gregor.pdf|Slides]]
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|[[media:rump_damian.pdf|Slides]]
|-
|18h46||5||Christian Rechberger ||Update on the 10000 Euro PRINCE cipher-breaking challenge
|[[media:rump_christian.pdf|Slides]]
|-
|18h51||5||Leo Perrin ||Stu� Available on Cryptolux.org
|[[media:rump_leo.pdf|Slides]]
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|[[media:rump_thomas.pdf|Slides]]
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|[[media:rump_gaetan.pdf|Slides]]
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|[[media:rump_feri.pdf|Slides]]
|-
|19h04||2||Michael Peeters ||Quotes from NSA’s Cryptolog
|[[media:rump_mip.pdf|Slides]]
|-
|19h06
|colspan=3|''the end''
|}
1c33ad65d849376d996fe35ff165bf127e9ec435
740
739
2015-01-15T11:43:00Z
Guest
4
wikitext
text/x-wiki
'''Please send your slides at <code>michael -DOT- peeters _AT_ noekeon -DOT- org</code> before 18:00.'''
Here the (DRAFT) rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title !! Slides
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|[[media:rump_willi.pdf|Slides]]
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|[[media:rump_gregor.pdf|Slides]]
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|[[media:rump_damian.pdf|Slides]]
|-
|18h46||5||Christian Rechberger ||Update on the 10000 Euro PRINCE cipher-breaking challenge
|[[media:rump_christian.pdf|Slides]]
|-
|18h51||5||Leo Perrin ||Stuff Available on Cryptolux.org
|[[media:rump_leo.pdf|Slides]]
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|[[media:rump_thomas.pdf|Slides]]
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|[[media:rump_gaetan.pdf|Slides]]
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|[[media:rump_feri.pdf|Slides]]
|-
|19h04||2||Michael Peeters ||Quotes from NSA’s Cryptolog
|[[media:rump_mip.pdf|Slides]]
|-
|19h06
|colspan=3|''the end''
|}
1411fd42780e909fc8a95be49b7804469cb5fe18
741
740
2015-01-15T11:43:23Z
Guest
4
wikitext
text/x-wiki
Here the rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title !! Slides
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|[[media:rump_willi.pdf|Slides]]
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|[[media:rump_gregor.pdf|Slides]]
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|[[media:rump_damian.pdf|Slides]]
|-
|18h46||5||Christian Rechberger ||Update on the 10000 Euro PRINCE cipher-breaking challenge
|[[media:rump_christian.pdf|Slides]]
|-
|18h51||5||Leo Perrin ||Stuff Available on Cryptolux.org
|[[media:rump_leo.pdf|Slides]]
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|[[media:rump_thomas.pdf|Slides]]
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|[[media:rump_gaetan.pdf|Slides]]
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|[[media:rump_feri.pdf|Slides]]
|-
|19h04||2||Michael Peeters ||Quotes from NSA’s Cryptolog
|[[media:rump_mip.pdf|Slides]]
|-
|19h06
|colspan=3|''the end''
|}
4d40f6e478c9a5363cafde611b8706ff801833c6
File:Rump christian.pdf
6
492
730
2015-01-15T11:34:30Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump damian.pdf
6
493
731
2015-01-15T11:34:54Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump feri.pdf
6
494
732
2015-01-15T11:35:14Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump gaetan.pdf
6
495
733
2015-01-15T11:35:32Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump gregor.pdf
6
496
734
2015-01-15T11:36:32Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump leo.pdf
6
497
735
2015-01-15T11:36:48Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump mip.pdf
6
498
736
2015-01-15T11:37:12Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Rump thomas.pdf
6
499
737
2015-01-15T11:37:31Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Talk.pdf
6
500
742
2015-01-15T12:50:37Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Eik List
0
428
743
585
2015-01-15T12:51:24Z
Guest
4
wikitext
text/x-wiki
Title: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
Abstract: In 2006, Rogaway and Shrimpton introduced the well-known deterministic AE scheme SIV, primarily to encrypt high-entropy plaintexts such as cryptographic keys. In the light of misuse-resistance, Fleischmann et al. showed at FSE'2012 that SIV's privacy breaks if an adversary gets access to would-be plaintexts. As a countermeasure, we introduce a decryption-misuse resistant version of SIV, called Robust IV or RIV.
fbf5a53461d208a2718ffa40da18a58993055046
Seminar program
0
416
744
725
2015-01-15T12:51:56Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
c25f9c71d75e313ae0493da4a0322bfec55d0042
746
744
2015-01-15T13:47:56Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On authenticated encryption
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
34baf7605fbef510d48430b1248981ac00973b78
751
746
2015-01-15T13:55:28Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
5258c6b7b4c930b517b5f6a2696e2b62a834121c
753
751
2015-01-15T14:00:31Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
20259ab7b2b98e9a4a6ec926763768babe3dd019
755
753
2015-01-15T15:22:23Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]] [[CAESAR_Discussion_(2015-01-13)|[Summary of the discussion]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
1934dcd881ded4358c3ef3143246f1bc36ed3e85
758
755
2015-01-15T15:24:34Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]] [[CAESAR_Discussion_(2015-01-13)|[Summary of the discussion]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
edff55f234fdd83944e48615d306605c60938ec8
761
758
2015-01-15T15:27:09Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]] [[CAESAR_Discussion_(2015-01-13)|[Summary of the discussion]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
763b6c8f9c4246e3459a4686f09da7bd13930fe2
762
761
2015-01-15T15:27:25Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]] [[CAESAR_Discussion_(2015-01-13)|[Summary of the discussion]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
c527edf99c979c4d24a999379029f75849072259
763
762
2015-01-15T15:32:08Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
5c92d754d573fa0b3281fb2b6b40f8cbd3e4c34a
766
763
2015-01-15T15:40:28Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: On provable security aspects of authenticated encryption
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
d1c7c46e0e400368e8864075af9b6d6e26bd930b
769
766
2015-01-15T15:43:36Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans?
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
d8ede68a9e13b572d33ea32839e0e18be9a90d95
773
769
2015-01-15T16:00:11Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
a5d8cc969d6c78445a1caf6fd68524245423b1d9
775
773
2015-01-15T16:43:34Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
ef89a5d13fdb7db86b08b5242c282dd61b1bd34e
File:Small-ESC Armknecht.pdf
6
501
745
2015-01-15T13:47:22Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Frederik Armknecht
0
423
747
561
2015-01-15T13:48:08Z
Guest
4
wikitext
text/x-wiki
Title: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
Abstract:
To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule of thumb says that the internal state size of a stream cipher should be at least twice the security parameter. As memory gates are usually the most area and power consuming components, this implies a sever limitation with respect to possible lightweight implementations.
In this talk, we revisit this rule. We argue that a simple shift in the established design paradigm, namely to involve the fixed secret key not only in the initialization process but in the keystream generation phase as well, enables stream ciphers with smaller area size for two reasons. First, it improves the resistance against the mentioned TMDTO attacks which allows to choose smaller state sizes. Second, one can make use of the fact that storing a fixed value (here: the key) requires less area size than realizing a register of the same length. We demonstrate the feasibility of this approach by describing and implementing a concrete stream cipher which uses significantly less area than comparable existing lightweight stream ciphers.
e826c7f53cc418d4ae9d8cb495ea4d5dad634a2d
File:ESC-Iwata-CLOC-09.pdf
6
502
748
2015-01-15T13:52:59Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:ESC-Iwata-GC-09.pdf
6
503
749
2015-01-15T13:53:24Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Tetsu Iwata
0
504
750
2015-01-15T13:54:59Z
Guest
4
Created page with "title: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]"
wikitext
text/x-wiki
title: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
56e960800089066f7531592de60b9297dc70762f
File:Caesar.pdf
6
505
752
2015-01-15T13:58:52Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
CAESAR Discussion (2015-01-13)
0
506
754
2015-01-15T15:21:30Z
Guest
4
Created page with "Stefan Lucks summarized the results of the discussion about CAESAR held at ESC 2015 in a mail reproduced below. <pre> Hi all, here are the results from our discussion. I did..."
wikitext
text/x-wiki
Stefan Lucks summarized the results of the discussion about CAESAR held at ESC 2015 in a mail reproduced below.
<pre>
Hi all,
here are the results from our discussion. I did sort them into "Checklist
items" for CAESAR candidates and potential "Work items" for the Commitee.
Please mail me if you think I forgot something, or I made a mistake!
So long
Stefan
Checklist for CAESAR candidates:
1. Robustness
a) online, nonce misuse
b) offline, nonce misuse
c) online, decryption misuse
d) offline, decryption misuse
2. Beyond-birthday security (i.e., >> 2^64 texts)
3. Good Performance without AES-NI
4. Equally good performance in Hardware and in Software
5. Secure, Fast
6. One winner to rule them all, or winners for different profiles
7. Parallelizability
8. "If you lieak the key in the case of (nonce) misuse, then throw the
system out of the window." (A.J.)
9. Good performance, combined with resistance to side-channel attacks
10. Diversity (based on different primitives)
11. Key-independent running time
(in contrast, e.g., to natural implementations of GCM)
12. a) For offline-ciphers: 1-pass or multipass
b) For Online-ciphers: fixed memory, fixed latency
Work-Items for the PC:
A) Need to investigate which desirable properties are mutually exclusive
B) Define/revisit notions for robustnes
C) Explore the tradeoff between robustness and efficiency
</pre>
15dea086a14333cded4212cb68568eb38ea6d6df
File:Lwe-esc2015.pdf
6
507
756
2015-01-15T15:23:39Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Carlos Cid
0
508
757
2015-01-15T15:24:15Z
Guest
4
Created page with "title: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]"
wikitext
text/x-wiki
title: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
fcb478cb8cda43bb956c842a091b8a3a354e3b79
File:Slides.pdf
6
509
759
2015-01-15T15:26:18Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Anne Canteaut
0
411
760
562
2015-01-15T15:26:44Z
Guest
4
wikitext
text/x-wiki
title: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
Abstract: In this work, we investigate the effect of affine transformations of the Sbox on the maximal expected differential probability and linear potential over two rounds of a substitution-permutation network, when the diffusion layer is linear over the finite field defined by the Sbox alphabet. One of our aims is to understand why the MEDP and MELP of the AES both increase when the AES Sbox is replaced by the inversion in GF{2^8}. Most notably, we will show that this phenomenon is related to the fact that the inversion is an involution.
bdcbd83eda462a97cd477a29eddd854703391010
File:Esc2015.pdf
6
510
764
2015-01-15T15:39:40Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Dmitry Khovratovich
0
419
765
557
2015-01-15T15:40:02Z
Guest
4
wikitext
text/x-wiki
Title: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
Abstract:
Practical attacks on password hashing/key derivation schemes and emergence of dedicated hardware rigs for cryptocurrency mining motivated the following problem:
"Design a fixed-input-length, preimage-resistant hash function such that it runs in fractions of seconds on modern desktops and servers, and the brute-force preimage search is not significantly cheaper on other architectures (GPUs, FPGAs, or even ASICs)."
We explore the state-of-the-art of this problem, discuss various issues of performance optimization and the cost metric for the adversaries, show new types of attacks arising in this context, and investigate the existing and prospective solutions from the cryptographic point of view.
From the attack point of view, we explore time-memory tradeoffs for memory-intensive password hashing schemes, which have been previously known in the framework of pebbling games on graphs. We outline several new cryptanalytic methods, which apply to two main classes of hashing schemes: those where memory access pattern is data-independent and those where it is data-dependent and is computed at runtime.
From the design point of view, we show how to use the logic and memory organization of the x86 architecture to maximize adversary's costs. We also demonstrate how to use multi-threading and read-only memory in the optimal and secure way.
801e551df920edf4e17d9510527d927058f996c5
File:AndreevaESCLux2015.pdf
6
511
767
2015-01-15T15:42:22Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Elena Andreeva
0
512
768
2015-01-15T15:42:54Z
Guest
4
Created page with "title: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]"
wikitext
text/x-wiki
title: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
709e5d909da8286ca2e2a9b80020747227202ae3
Gaetan Leurent
0
513
770
2015-01-15T15:45:59Z
Guest
4
Created page with "Title: On Chaskey [[Media:slides-chaskey.pdf|[slides]]]"
wikitext
text/x-wiki
Title: On Chaskey [[Media:slides-chaskey.pdf|[slides]]]
bd43bd90361ea7dd97d76335ae365e75c50a2237
File:Slides-chaskey.pdf
6
514
771
2015-01-15T15:46:25Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Aes-and-its-patrons.pdf
6
515
772
2015-01-15T15:58:47Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Esc2015-mip-wb challenges.pdf
6
516
776
2015-01-15T17:02:01Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Seminar program
0
416
777
775
2015-01-15T17:02:28Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-?
See the [[Rump session]] program.
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
fac7c446cc67c6767810e0d0d8ee74fa5689ab2f
778
777
2015-01-15T17:03:55Z
Guest
4
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
3ecbe7a41014b5baa90d5bdbb1c7c8d5aed3daba
782
778
2015-01-15T17:34:58Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 10:50-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
3d2995810e0b41bc5ded33afb5389e01f90076de
783
782
2015-01-15T17:54:24Z
Joan
3
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]] On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
c9095b7df0d220a44f8fedda9df025ce116ffdfb
785
783
2015-01-15T20:44:30Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
ed8a8ed6d22fe1800fab6af5bfa5c011c9756f00
789
785
2015-01-16T08:08:00Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
1ee5e31eb8770c7a0979bd9f20efd6d458ba5f3e
792
789
2015-01-16T08:10:38Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
3f925d9d0ee34f10c9523c20eed9d2fea8d2e361
795
792
2015-01-16T08:13:29Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:30-14:00 ''Lunch''
8159e06cc44a54b52bc0e75c254ba537fb7e003c
796
795
2015-01-16T09:07:44Z
Alex
2
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
''Closing ESC2015''
12:00-14:00 ''Lunch''
473149ee9003f794f0c212f7abd9e3cdc610d1c0
797
796
2015-01-16T09:09:46Z
Alex
2
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the S-box decomposition challenge
''Closing ESC2015''
12:00-14:00 ''Lunch''
6e9d64aa1eba572a1382de621f49574428afd1b0
798
797
2015-01-16T09:50:06Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Slides_ESC_2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the S-box decomposition challenge
''Closing ESC2015''
12:00-14:00 ''Lunch''
9dcda6ffe71f38e1050e4d943b1a51a5d9000dc2
802
798
2015-01-16T09:52:10Z
Guest
4
/* 15 January 2015 4th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Slides_ESC_2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the S-box decomposition challenge
''Closing ESC2015''
12:00-14:00 ''Lunch''
7bb767a91cb085cfd34fc90c5e160c49004bd90b
804
802
2015-01-16T10:28:17Z
Alex
2
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Slides_ESC_2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the S-box decomposition challenge goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
''Closing ESC2015''
12:00-14:00 ''Lunch''
f9a3779481eb742a3fb9b30300173ac010a0132a
805
804
2015-01-16T10:31:21Z
Alex
2
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Slides_ESC_2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
''Closing ESC2015''
12:00-14:00 ''Lunch''
081122a603b689681181b3b993678647cf01448e
808
805
2015-01-16T10:34:48Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
''Closing ESC2015''
12:00-14:00 ''Lunch''
902254fc719d769f6eacad3092293983f2d2410a
813
808
2015-01-17T13:34:33Z
Guest
4
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
''Closing ESC2015''
12:00-14:00 ''Lunch''
3ce6c7b019af4d88673883aaf2e7000763a15edb
817
813
2015-01-19T08:43:36Z
Guest
4
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR?
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
''Closing ESC2015''
12:00-14:00 ''Lunch''
ae9d418f1412f3acfd262732c4ef41a53f56425b
822
817
2015-01-21T09:34:50Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR. [[media:Sec_and_rob.pdf|[summary of the discussions]]]
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
''Closing ESC2015''
12:00-14:00 ''Lunch''
1b475b70d53f50e4e883a1b0137704b3737d4db0
823
822
2015-01-21T09:35:43Z
Guest
4
/* 16 January 2015 5th day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR. [[media:Sec_and_rob.pdf|[summary of the discussions]]]
''Closing ESC2015''
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
12:00-14:00 ''Lunch''
21e136a802df0fc24fd25e4c55a66469f5762549
Rump session
0
475
779
741
2015-01-15T17:04:46Z
Guest
4
wikitext
text/x-wiki
Here the rump session program:
{| class=wikitable
!Start !! # min !! Author !! Title !! Slides
|-
|18h20||6||Willi Meier ||Higher Order Differentials in NORX
|[[media:rump_willi.pdf|[slides]]]
|-
|18h26||5||Yu Sasaki ||How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
|
|-
|18h31||3||Gregor Leander ||Decomposing ASASA
|[[media:rump_gregor.pdf|[slides]]]
|-
|18h34||6||Henri Gilbert ||Format Oracles in OpenPGP
|
|-
|18h40||6||Damian Vizar ||Boosting Keyak for Almost Free Authentication of Associated Data
|[[media:rump_damian.pdf|[slides]]]
|-
|18h46||5||Christian Rechberger ||Update on the 10000 Euro PRINCE cipher-breaking challenge
|[[media:rump_christian.pdf|[slides]]]
|-
|18h51||5||Leo Perrin ||Stuff Available on Cryptolux.org
|[[media:rump_leo.pdf|[slides]]]
|-
|18h53||2||Thomas Peyrin ||DIAC 2015 & ASK 2015 in Singapore
|[[media:rump_thomas.pdf|[slides]]]
|-
|18h58||5||Gaetan Leurent ||Cryptanalysis of Marble
|[[media:rump_gaetan.pdf|[slides]]]
|-
|19h03||1||Farzaneh Abed ||On Cryptographer Alignment
|[[media:rump_feri.pdf|[slides]]]
|-
|19h04||2||Michael Peeters ||Quotes from NSA’s Cryptolog
|[[media:rump_mip.pdf|[slides]]]
|-
|19h06
|colspan=3|''the end''
|}
1400c5ad9ec99128a7d881c9dc13842c6fb09e5b
File:Sasaki ESC2015.pdf
6
517
780
2015-01-15T17:34:11Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Yu Sasaki
0
424
781
571
2015-01-15T17:34:39Z
Guest
4
wikitext
text/x-wiki
Title: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Abstract: We study the nonce-based authenticated encryption where the sender does not transmit the initialization vector IV (the nonce) but instead transmits the corresponding finalization vector FV in a communication channel, possibly along with associated data A, tag T and ciphertext C. Here, FV should not be merely ``enciphered IV,'' but be properly generated from IV, A and plaintext M. A receiver then (hopefully) checks the integrity of quadruplet (FV,A,T,C) and (hopefully with successful verification) recovers the plaintext M by decrypting (FV,A,T,C). This paper presents a generic method named tag feedback, which converts a
conventional nonce-based scheme to an IV-FV one with just a single invocation of a tweakable block cipher. The tag feedback substantially improves the robustness of the scheme: now the resulting IV-FV scheme remains secure even if the decryption algorithm is compelled to release unverified plaintext M, as long as the accompanying triplet (FV,A,T) is new.
cf411bd4bdcde30e55c72f7d8b60d5d2bf4517c1
Vesselin Velichkov
0
477
784
688
2015-01-15T20:43:43Z
Guest
4
wikitext
text/x-wiki
'''Title:''' On Improving the Data Complexity of Attacks on RC5
Joint work with Alex Biryukov
'''Abstract:''' We propose new techniques for improving the average data complexity of the best attacks on RC5. The main contribution is an improved filtration procedure for a more efficient detection of good pairs from noise. It is an extended variant of the filtration algorithm proposed by Biryukov et al. and applied in the best attack on the cipher to date. With the new technique we decrease the data complexity of the attacks on $\mathrm{RC5}$ reduced to $8$ and $10$ rounds by a factor of $2^{2.7}$ and $2^{1.35}$ respectively and we provide an estimation for the full cipher.
c061d337a23b3db6ebc1296d8c0b5491d7b23e29
786
784
2015-01-15T22:53:35Z
Guest
4
wikitext
text/x-wiki
'''Title:''' On Improving the Data Complexity of Attacks on RC5
Joint work with Alex Biryukov
'''Abstract:''' We propose new techniques for improving the average data complexity of the best attacks on RC5 by about a factor of $4$. The main contribution is an improved filtration procedure for a more efficient detection of good pairs from noise. It is an extended variant of the filtration algorithm proposed by Biryukov et al. and applied in the best attack on the cipher to date. With the new technique we decrease the data complexity of the attacks on $\mathrm{RC5}$ reduced to $8$ and $10$ rounds by a factor of $2^{2.7}$ and $2^{1.35}$ respectively and we provide an estimation for the full cipher.
6624d9402b3997fe9210a33fd014011d8afde099
799
786
2015-01-16T09:50:19Z
Guest
4
wikitext
text/x-wiki
'''Title:''' On Improving the Data Complexity of Attacks on RC5 [[media:Slides_ESC_2015.pdf|[slides]]]
Joint work with Alex Biryukov
'''Abstract:''' We propose new techniques for improving the average data complexity of the best attacks on RC5 by about a factor of $4$. The main contribution is an improved filtration procedure for a more efficient detection of good pairs from noise. It is an extended variant of the filtration algorithm proposed by Biryukov et al. and applied in the best attack on the cipher to date. With the new technique we decrease the data complexity of the attacks on $\mathrm{RC5}$ reduced to $8$ and $10$ rounds by a factor of $2^{2.7}$ and $2^{1.35}$ respectively and we provide an estimation for the full cipher.
0507e846d4231c5962b7ee91dd95841431d194e0
807
799
2015-01-16T10:34:11Z
Guest
4
wikitext
text/x-wiki
'''Title:''' On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
Joint work with Alex Biryukov
'''Abstract:''' We propose new techniques for improving the average data complexity of the best attacks on RC5 by about a factor of $4$. The main contribution is an improved filtration procedure for a more efficient detection of good pairs from noise. It is an extended variant of the filtration algorithm proposed by Biryukov et al. and applied in the best attack on the cipher to date. With the new technique we decrease the data complexity of the attacks on $\mathrm{RC5}$ reduced to $8$ and $10$ rounds by a factor of $2^{2.7}$ and $2^{1.35}$ respectively and we provide an estimation for the full cipher.
6823c7c18232e4b38b1fd703dd5939854404f171
File:Pierrot Discrete logs.pdf
6
518
787
2015-01-16T08:06:45Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Cécile Pierrot
0
470
788
649
2015-01-16T08:07:36Z
Guest
4
wikitext
text/x-wiki
== '''Title :''' Simplified Settings for Discrete Logarithm in Small Characteristic Finite Fields. ==
[[media:Pierrot_Discrete_logs.pdf|[slides]]]
'''Abstract :''' Public key cryptography (please, don't blame me) is based on hard problems, such as the discrete logarithm problem (DLP). In this talk, I focus on the discrete logarithm problem in finite fields:
''Given F_(p^n) and a generator g of F_(p^n)*, we say that we solve the DLP in F_(p^n) if, for any arbitrary element h in F_(p^n)*, we are able to recover an integer x such that:
g^x = h.''
When the characteristic p is small compared to the extension degree n, the best complexity that can be achieved is quasipolynomial in log(p^n). I present here a simplified version of this quasipolynomial algorithm that have several advantages:
1/ I swear it is simple :) or at least I will do my best to make it understandable.
2/ Still, it does work.
3/ More seriously : together with additional ideas, simplifying the original settings permits to decrase the complexity of the phases that dominate, in practice, all discrete logarithms computations.
6e3e6891b4dcd31d14d298053b3813945279e2df
File:Fx.pdf
6
519
790
2015-01-16T08:09:36Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Itai Dinur
0
520
791
2015-01-16T08:10:14Z
Guest
4
Created page with "title: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]"
wikitext
text/x-wiki
title: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
fb85520e39906ee5b660111585c5ae83a28a7124
File:Slides ESC 2015.pdf
6
521
793
2015-01-16T08:12:48Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Thomas Peyrin
0
522
794
2015-01-16T08:13:14Z
Guest
4
Created page with "title: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]"
wikitext
text/x-wiki
title: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
9ec325deaae880dfa342a77f8637d17dac46d89d
File:Slide.pdf
6
523
800
2015-01-16T09:51:14Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Kazumaro Aoki
0
478
801
694
2015-01-16T09:51:45Z
Guest
4
wikitext
text/x-wiki
Title: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
Abstract:
This talk consists of two talks. The first part considers some property on sbox, and analyzes Proest and Minalpher sboxes. The second part considers the implementation of the underlying primitive of Proest and Minalpher. Comments on Sandy/Ivy Bridge and Haswell/Broadwell are given.
ba384764e3e71cbc8831cadbd1dbf25073c93b5c
List of participants
0
407
803
692
2015-01-16T10:23:31Z
Alex
2
wikitext
text/x-wiki
=== Participants ===
*[[Andrey Bogdanov]]
*[[Anne Canteaut]]
*[[Antoine Joux]]
*[[Bart Preneel]]
*[[Carlos Cid]]
*[[Cécile Pierrot]]
*[[Celine Blondeau]]
*[[Cristian Rechberger]]
*[[Damian Vizar]]
*[[Dmitry Khovratovich]]
*[[Eik List]]
*[[Elena Andreeva]]
*[[Farzaneh Abed]]
*[[Florian Mendel]]
*[[François-Xavier Standaert]]
*[[Frederik Armknecht]]
*[[Gaetan Leurent]]
*[[Gildas Avoine]]
*[[Gilles Van Assche]]
*[[Gregor Leander]]
*[[Henri Gilbert]]
*[[Itai Dinur]]
*[[Kaisa Nyberg]]
*[[Kan Yasuda]]
*[[Kazumaro Aoki]]
*[[Leo Perrin]]
*[[Maria Naya-Plasencia]]
*[[Michael Peeters]]
*[[Petr Susil]]
*[[Reza Reyhanitabar]]
*[[Tetsu Iwata]]
*[[Thomas Peyrin]]
*[[Vesselin Velichkov]]
*[[Willi Meier]]
*[[Yu Sasaki]]
*[[Alex Biryukov]]
*[[Joan Daemen]]
*[[Stefan Lucks]]
*[[Serge Vaudenay]]
025fc17b48fffc5027d110e27b380e20bf961b19
File:Rc5-slides-esc2015.pdf
6
524
806
2015-01-16T10:33:56Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Nyberg.pdf
6
525
809
2015-01-17T13:26:27Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
824
809
2015-01-25T20:49:39Z
Guest
4
Guest uploaded a new version of "[[File:Nyberg.pdf]]"
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
825
824
2015-01-25T20:51:28Z
Guest
4
Guest uploaded a new version of "[[File:Nyberg.pdf]]"
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
826
825
2015-01-25T20:54:49Z
Guest
4
Guest uploaded a new version of "[[File:Nyberg.pdf]]"
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Kaisa Nyberg
0
474
810
669
2015-01-17T13:32:20Z
Guest
4
wikitext
text/x-wiki
[[File:Nyberg.pdf]]
''Title:'' Reverse-Engineering Hidden Assumptions in Differential-Linear Attacks
''Abstract:'' Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
4972b06e84e567d6b22ff71b0c5d0d6212b6c2af
811
810
2015-01-17T13:32:58Z
Guest
4
wikitext
text/x-wiki
[[Slides:Nyberg.pdf]]
''Title:'' Reverse-Engineering Hidden Assumptions in Differential-Linear Attacks
''Abstract:'' Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
b9f2372331ca8af2d24a307df8fd8118a43225f0
812
811
2015-01-17T13:33:27Z
Guest
4
wikitext
text/x-wiki
[[File:Nyberg.pdf]]
''Title:'' Reverse-Engineering Hidden Assumptions in Differential-Linear Attacks
''Abstract:'' Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
4972b06e84e567d6b22ff71b0c5d0d6212b6c2af
814
812
2015-01-17T13:35:32Z
Guest
4
wikitext
text/x-wiki
[[media:Nyberg.pdf|[slides]]]
''Title:'' Reverse-Engineering Hidden Assumptions in Differential-Linear Attacks
''Abstract:'' Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
4800c74501651c122c2eec820bede7430df4ec06
File:Presentation.pdf
6
526
815
2015-01-19T08:42:31Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
820
815
2015-01-20T10:02:37Z
Guest
4
Guest uploaded a new version of "[[File:Presentation.pdf]]"
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Céline Blondeau
0
472
816
656
2015-01-19T08:43:23Z
Guest
4
wikitext
text/x-wiki
title: Remarks on the data complexity of some statistical attacks [[media:Presentation.pdf|[slides]]]
abstract: In this talk, we present some experimental results on multidimensional zero-correlation linear attacks and multiple zero-correlation linear attack. We show how, considering distinct known plaintexts, we can improve the complexity of multiple zero-correlation attacks.
Some open questions related to the relation between differential and linear attacks are also discussed.
9dfdbbfa7bda6fd3415bcb0c21b36acfcd764559
Florian Mendel
0
527
818
2015-01-20T06:51:44Z
Guest
4
Created page with "Research in symmetric cryptography in the last few years is mainly driven by dedicated high-profile open competitions such as NIST’s AES and SHA-3 selection procedures, ECRY..."
wikitext
text/x-wiki
Research in symmetric cryptography in the last few years is mainly driven by dedicated high-profile open competitions such as NIST’s AES and SHA-3 selection procedures, ECRYPT’s eSTREAM project, or the ongoing CAESAR initiative. These focused competitions in symmetric cryptography are generally viewed as having provided a tremendous increase in the understanding and confidence in the security of these cryptographic primitives. However, the tremendous increase of submissions to such competitions reveal major problems related to analytical effort for the cryptographic community. To get a good view on the security margin of the various submissions automatic tools are needed to assist the cryptanalyst in his work.
In this talk we present a framework that allows cryptanalysts to conduct an automated preliminary analysis on a potentially high number of authenticated encryption algorithms. The framework automatically parses the C-reference implementation, delivered in the submission to the CAESAR competition, into an abstract cipher representation. This representation can be combined with a tool specific adapter to transform the abstract cipher representation into the tool representation needed. This process works independent of the cipher given as input and can therefore be automatically applied to many different submissions. This saves the cryptanalyst time, which can be used to conduct dedicated analysis based on the preliminary results. The framework was demonstrated using three CAESAR submissions as an example.
This is joint work with Christoph Hechenblaikner.
1930e3e78484a44fad14acda123b79f85d8a5125
819
818
2015-01-20T06:54:59Z
Guest
4
wikitext
text/x-wiki
'''Title:''' Towards Automated Cryptanalysis of CAESAR Candidates
'''Abstract:''' Research in symmetric cryptography in the last few years is mainly driven by dedicated high-profile open competitions such as NIST’s AES and SHA-3 selection procedures, ECRYPT’s eSTREAM project, or the ongoing CAESAR initiative. These focused competitions in symmetric cryptography are generally viewed as having provided a tremendous increase in the understanding and confidence in the security of these cryptographic primitives. However, the tremendous increase of submissions to such competitions reveal major problems related to analytical effort for the cryptographic community. To get a good view on the security margin of the various submissions automatic tools are needed to assist the cryptanalyst in his work.
In this talk we present a framework that allows cryptanalysts to conduct an automated preliminary analysis on a potentially high number of authenticated encryption algorithms. The framework automatically parses the C-reference implementation, delivered in the submission to the CAESAR competition, into an abstract cipher representation. This representation can be combined with a tool specific adapter to transform the abstract cipher representation into the tool representation needed. This process works independent of the cipher given as input and can therefore be automatically applied to many different submissions. This saves the cryptanalyst time, which can be used to conduct dedicated analysis based on the preliminary results. The framework was demonstrated using three CAESAR submissions as an example. This is work in progress.
This is joint work with '''Christoph Hechenblaikner'''.
2d918a38749fdcdeb3f30f8c42b952fcf8861530
File:Sec and rob.pdf
6
528
821
2015-01-21T09:34:18Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
File:Nyberg rev.pdf
6
529
827
2015-01-25T21:01:22Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Seminar program
0
416
828
823
2015-01-25T21:03:12Z
Guest
4
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg_rev.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR. [[media:Sec_and_rob.pdf|[summary of the discussions]]]
''Closing ESC2015''
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
12:00-14:00 ''Lunch''
0a60e07e088fc98f2d413245aaf88e5100832c95
832
828
2015-01-27T14:28:16Z
Guest
4
/* 13 January 2015 2nd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions [[media:Tmto.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg_rev.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR. [[media:Sec_and_rob.pdf|[summary of the discussions]]]
''Closing ESC2015''
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
12:00-14:00 ''Lunch''
11c0334d7015e6327a2cd592c3295c3d730d0f99
835
832
2015-01-27T16:54:13Z
Guest
4
/* 12 January 2015 1st day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption [[media:Caesar_classification.pdf|[slides]]]
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions [[media:Tmto.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg_rev.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR. [[media:Sec_and_rob.pdf|[summary of the discussions]]]
''Closing ESC2015''
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
12:00-14:00 ''Lunch''
d05405a75fe0ce7a768c8aa2f3909d09bcd2c89b
838
835
2015-01-30T09:20:07Z
Guest
4
/* 14 January 2015 3rd day of the seminar */
wikitext
text/x-wiki
== '''12 January 2015 1st day of the seminar''' ==
8:30-9:00 ''Welcome coffee/tea''
9:00 Seminar start
'''Session 1: Cryptanalysis (Chair Itai Dinur)''' 9:00-10:20
[[Willi Meier]]: Fast correlation attacks over extension fields (joint work with Bin Zhang and Chao Xu) [[media:Large-unit.pdf|[slides]]]
[[Gregor Leander]]: Some insights in the Simon round function [[media:Simon_esc2015.pdf|[slides]]] AND Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows [[media:ShiftRows_esc2015.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Exotic implementation requirements (Chair François-Xavier Standaert), part 1''' 10:50-12:10
[[Joan Daemen]]: Spectral characterization of uniformity loss and application to Keccak, revisited [[media:NonUniformSharingAtESC.pdf|[slides]]]
[[Dmitry Khovratovich]]: Design and analysis of memory-hard functions [[media:Esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Exotic implementation requirements (Chair François-Xavier Standaert), part 2''' 15:10 - 15:50
[[Michaël Peeters]]: Challenges in White-Box Cryptography [[media:esc2015-mip-wb_challenges.pdf|[slides]]]
'''Session 4: Authenticated encryption and provable security (Chair Tetsu Iwata), part 1''' 15:50 - 17:10
[[Gilles Van Assche]]: Generic security of the keyed sponge [[media:KeyedSpongeAtESC.pdf|[slides]]]
[[Reza Reyhanitabar]]: Boosting OMD for Almost Free Authentication of Associated Data [[media:POMD.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 5: Authenticated encryption and provable security (Chair Tetsu Iwata), part 2''' 17:40 - 19:00
[[Farzaneh Abed]]: Overview of the CAESAR Candidates for Authenticated Encryption [[media:Caesar_classification.pdf|[slides]]]
[[Elena Andreeva]]: Authenticated Encryption and the CAESAR Competion [[media:AndreevaESCLux2015.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''13 January 2015 2nd day of the seminar''' ==
'''Session 1: Early topics (Chair Anne Canteaut)''' 9:00-10:20
[[Leo Perrin]]: On reverse-engineering S-boxes with hidden design criteria or structure [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] [[Media:Lpe-reverse-engineer.pdf|[slides]]]
[[Gildas Avoine]]: Time-memory Trade-off Applied to Non-uniform Distributions [[media:Tmto.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Cipher design (Chair Henri Gilbert)''' 10:50-12:25
[[Frederik Armknecht]]: On Lightweight Stream Ciphers with Shorter Internal States [[media:Small-ESC_Armknecht.pdf|[slides]]]
[[Christian Rechberger]]: About new cipher design
12:30-14:00 ''Lunch''
'''Session 3: CAESAR and Authenticated encryption (Chair Stefan Lucks)''' 14:10 - 16:50
[[Eik List]]: RIV: Decryption-Misuse-Resistant SIV [[media:Talk.pdf|[slides]]]
[[Yu Sasaki]]: IV-FV Authenticated Encryption and Triplet-Robust Decryption [[media:Sasaki_ESC2015.pdf|[slides]]]
Discussion on CAESAR selected topics, with introduction by [[Stefan Lucks]]. [[media:Caesar.pdf|[slides]]]
16:50 - 17:20 ''Break''
'''Session 4: Cryptanalysis (Chair Bart Preneel)''' 17:20 - 18:50
[[Cécile Pierrot]]: On discrete logarithms in finite fields [[media:Pierrot_Discrete_logs.pdf|[slides]]]
[[Maria Naya-Plasencia]]: On impossible differential attacks [[media:ESC15.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''14 January 2015 3rd day of the seminar''' ==
'''Session 1: Complexity of attacks (Chair Antoine Joux)''' 9:00-10:20
[[Petr Susil]]: On algebraic attacks [[media:Susil.pdf|[slides]]]
[[Céline Blondeau]]: Remarks on the data complexity of zero-correlation linear attacks [[media:Presentation.pdf|[slides]]]
10:00-10:30 ''Break''
'''Session 2: Reverse and forward engineering (Chair Carlos Cid)''' 10:30-11:40
[[Kaisa Nyberg]]: Reverse-engineering hidden assumptions in differential-linear cryptanalysis [[media:Nyberg_rev.pdf|[slides]]]
[[François-Xavier Standaert]]: Updates on LS-designs and Algebraic Side-Channel Attacks
11:50-13:30 ''Lunch''
'''Free time in the afternoon'''
Excursion 14:00 - 18:00. We will go to the Vianden Castle (40 mins with a bus).
Arrive back at the hotel at 18:10
'''Rump session (Chair Michaël Peeters):''' 18:20-19:00 [[Rump session|[program and slides]]]
19:00 - 21:00 ''Dinner''
== '''15 January 2015 4th day of the seminar''' ==
'''Session 1: Post-Snowden authenticated encryption (Chair Serge Vaudenay)''' 9:00-10:20
[[Bart Preneel]]: Post-Snowden crypto [[media:Pdf.pdf|[slides]]]
[[Tetsu Iwata]]: On Tweak Functions in CLOC [[media:ESC-Iwata-CLOC-09.pdf|[slides]]] AND More on Generic Composition [[media:ESC-Iwata-GC-09.pdf|[slides]]]
10:20-10:50 ''Break''
'''Session 2: Odds and ends (Chair Elena Andreeva)''' 10:50-12:20
[[Andrey Bogdanov]]: How Secure is AES under Passive Trojans? [[media:Aes-and-its-patrons.pdf|[slides]]]
[[Florian Mendel]]: On cryptanalysis of CAESAR candidates
[[Carlos Cid]]: Algebraic Algorithms for the Learning with Errors (LWE) problem [[media:Lwe-esc2015.pdf|[slides]]]
12:30-14:00 ''Lunch''
'''Session 3: Cryptanalysis and bounds (Chair Gilles Van Assche)''' 15:10 - 17:10
[[Anne Canteaut]]: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks [[media:Slides.pdf|[slides]]]
[[Gaetan Leurent]]: On cryptanalysis of the Chaskey MAC [[Media:slides-chaskey.pdf|[slides]]]
[[Itai Dinur]]: New Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions [[media:Fx.pdf|[slides]]]
17:10 - 17:40 ''Break''
'''Session 4: More on authenticated encryption (Chair Andrey Bogdanov)''' 17:40 - 19:00
[[Kan Yasuda]]: Incremental authenticated encryption II
[[Kazumaro Aoki]]: Observations on Proest and Minalpher [[media:Slide.pdf|[slides]]]
19:00 - 21:00 ''Dinner''
== '''16 January 2015 5th day of the seminar''' ==
'''Session 1: Cryptanalysis (Chair Florian Mendel)''' 9:00-10:25
[[Thomas Peyrin]]: Cryptanalysis of JAMBU [[media:Slides_ESC_2015.pdf|[slides]]]
[[Vesselin Velichkov]]: On Improving the Data Complexity of Attacks on RC5 [[media:Rc5-slides-esc2015.pdf|[slides]]]
10:30-11:00 ''Break''
'''Session 2: CAESAR''' 11:00-12:20
Some more discussion on CAESAR. [[media:Sec_and_rob.pdf|[summary of the discussions]]]
''Closing ESC2015''
Prize for the [https://www.cryptolux.org/index.php/ESC_2015_Challenge (Reverse-engineering challenge)] goes to [[Gaetan Leurent]]
(reverse-engineering 5 round Feistel 8x8 S-box in 1 second on a PC)
12:00-14:00 ''Lunch''
a72ce46beeb793fd4bf65a1c881eec90e6e205a0
Kaisa Nyberg
0
474
829
814
2015-01-25T21:03:51Z
Guest
4
wikitext
text/x-wiki
[[media:Nyberg_rev.pdf|[slides]]]
''Title:'' Reverse-Engineering Hidden Assumptions in Differential-Linear Attacks
''Abstract:'' Differential-linear (DL) cryptanalysis has been quite successful in attacking block ciphers, Serpent, in particular. At FSE 2014 Blondeau et al. provided a thorough analysis of its foundations. We gave a complete expression of the probability of the DL relation in terms of the differential probabilities of the first part of the cipher and squared correlations over the latter part of the cipher. We know by now that DL statistics can be derived from a truncated differential attack.
In applications the simple models by Biham et al. [Asiacrypt 2002] and Lu [FSE 2012] are still widely used. The question how these simple ad hoc models relate to the theory was not yet addressed. In this talk I will identify some sufficient assumptions under which the previous models can be derived from our general model. These considerations have relevance in practice: cryptanalysts should know which properties of the cipher are sufficient to be validated in simulations, when using the models of Biham et al. or Lu.
At the end of my talk I will discuss another statistical model of DL attacks, which is more efficient in terms of data complexity. Interestingly, this model captures also the average behaviour of boomerang probabilities.
99c5b871d876a8b8d5f0ba666a4ce5a302be3de1
File:Tmto.pdf
6
530
830
2015-01-27T14:27:32Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Gildas Avoine
0
422
831
560
2015-01-27T14:28:02Z
Guest
4
wikitext
text/x-wiki
Title: Time-memory Trade-off Applied to Non-uniform Distributions [[media:Tmto.pdf|[slides]]]
Abstract: Cryptanalytic time-memory trade-offs (TMTO) were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems. A major advance was presented at Crypto 2003 by Oechslin, with the rainbow tables that outperform Hellman's seminal work. After introducing the cryptanalytic time-memory trade-offs, we will present in this talk a technique to improve the efficiency of TMTOs when considering non-uniform distributions, e.g. to crack non-uniformly distributed passwords.
863bd73cab627fc394db3c184d98944e976de063
File:Caesar classification.pdf
6
531
833
2015-01-27T16:53:29Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Farzaneh Abed
0
421
834
559
2015-01-27T16:54:01Z
Guest
4
wikitext
text/x-wiki
Farzaneh Abed: Overview of the CAESAR Candidates for Authenticated Encryption [[media:Caesar_classification.pdf|[slides]]]
Abstract: The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 50 remaining first-round submissions go through an intensive review, analysis and comparison process. While the cryptographic community benefits greatly from the manifold different submission designs, their pure number implies a challenging amount of study. As part of a remedy, we provide an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings of the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream-cipher-, permutation-/sponge-, compression-function-based, dedicated).
291c311a79fd980536863488d723947fe6541d5b
File:Susil.pdf
6
532
836
2015-01-30T09:19:19Z
Guest
4
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
Petr Susil
0
533
837
2015-01-30T09:19:52Z
Guest
4
Created page with "title: On algebraic attacks [[media:Susil.pdf|[slides]]]"
wikitext
text/x-wiki
title: On algebraic attacks [[media:Susil.pdf|[slides]]]
68065f0a16fcaca2705e2553ab7cc5f3ba81f45b
Proceedings
0
534
839
2015-04-28T08:22:24Z
Yann
1
Created page with "__NOTOC__ [[media:proceedings_esc2015.pdf | ESC 2015 Proceedings]]"
wikitext
text/x-wiki
__NOTOC__
[[media:proceedings_esc2015.pdf | ESC 2015 Proceedings]]
ad5789a6bd10b41752d5c963b620054bcdf542b3
File:Proceedings esc2015.pdf
6
535
840
2015-04-28T08:22:46Z
Yann
1
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
842
840
2015-04-30T12:23:08Z
Yann
1
Yann uploaded a new version of "[[File:Proceedings esc2015.pdf]]"
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
843
842
2015-05-04T07:46:16Z
Yann
1
Yann uploaded a new version of "[[File:Proceedings esc2015.pdf]]"
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
844
843
2015-06-01T10:40:55Z
Yann
1
Yann uploaded a new version of "[[File:Proceedings esc2015.pdf]]": Corrected typo (symetric -> symmetric)
wikitext
text/x-wiki
da39a3ee5e6b4b0d3255bfef95601890afd80709
ESC 2015
0
3
841
552
2015-04-28T08:24:39Z
Yann
1
/* Proceedings */
wikitext
text/x-wiki
__NOTOC__
[[Image:clervaux.jpg|400px|thumb|Clervaux]]
== Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg ==
Early Symmetric Cryptography (ESC) is a bi-annual event ([https://www.cryptolux.org/mediawiki-esc2008/index.php/Home 2008], [https://www.cryptolux.org/mediawiki-esc2010/index.php/ESC_2010 2010], [https://www.cryptolux.org/mediawiki-esc2013/index.php/ESC_2013 2013]) taking place in Luxembourg and paired with Dagstuhl seminars ([http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=07021 2007], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=09031 2009], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12031 2012], [http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=14021 2014]) on symmetric cryptography.
Cryptography deals with secure communication in adversarial environments as well as protecting information in storage. It is the key ingredient of information security. Applications such as electronic commerce, e-banking, secure communications (ex. mobile phones, Skype, etc.) are made possible due to advances in applied cryptography. The seminar is concentrating on:
* symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and
* complex cryptosystems and cryptographic protocols employing these primitives
* algorithmic challenges in public and symmetric cryptography.
The aim of the workshop is to bring together leading experts and talented junior researchers and to let them exchange ideas, open problems in an informal atmosphere.
=== Program Chairs ===
[https://www.cryptolux.org/index.php/Alex_Biryukov Alex Biryukov]
[http://jda.noekeon.org/ Joan Daemen]
[http://www.uni-weimar.de/de/medien/professuren/mediensicherheit/people/stefan-lucks/ Stefan Lucks]
[http://lasecwww.epfl.ch/~vaudenay/ Serge Vaudenay]
=== The List of topics ===
* Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Authenticated Encryption, Lightweight crypto, Provable Security, Cryptanalysis
* RFID protocols, crypto standards for Internet of Things
* Algorithmic challenges in SK and PK crypto (algorithmic cryptanalysis, lattices, multivariate crypto, factoring, etc.)
Special sub-topics that will be explored this year are:
*Evaluation of submissions for the authenticated encryption competition ([http://competitions.cr.yp.to/caesar.html CAESAR]) sponsored by NIST.
*Evaluation of candidates for the currently running [https://password-hashing.net/ password-hashing competition].
*Design and analysis of lightweight cryptography (see also [https://www.cryptolux.org/index.php/ACRYPT_%28CORE/FNR/SnT%29 ACRYPT] project).
=== Program ===
Here is the [https://www.cryptolux.org/mediawiki-esc2015/index.php/Seminar_program seminar program]
=== Proceedings ===
[[media:proceedings_esc2015.pdf | ESC 2015 Proceedings]]
=== Venue ===
The conference will be held at the hotel [http://www.interclervaux.lu/?lang=en International] in Clervaux, a medieval town in Luxembourg in the [http://en.wikipedia.org/wiki/Ardennes Ardennes].
Please contact the [http://www.interclervaux.lu/?lang=en hotel] for the booking.
Please put <fabienne.schmitz@uni.lu> in CC.
Hotel prices:
Single room : 85 €
Double room : 105 €
Price includes breakfast, free WiFi, access to wellness (swimming pool, sauna, hammam, fitness).
We cover lunches, dinners and venue costs. There are no registration fees.
=== Tourism ===
*Clervaux castle
*Vianden castle (organized excursion is planned)
*Hikes
=== Weather ===
Typical temperatures in Luxembourg in January are -2 -- +10. Take a good rain coat and hiking shoes if you want to explore the surroundings.
=== Sponsors ===
This event is sponsored by the [http://www.fnr.lu Fonds National de la Recherche Luxembourg] and by the [http://lacs.uni.lu Laboratory of Algorithmics, Cryptology and Security]
[[Image:Fnr_logo_web.jpg|200px|FNR logo]] [[Image:LACS-logo.jpg|200px|LACS logo]]
88c4f602b2f2118ab491e22e42c7d692597d025a